info: name: Automountd Service Running - Privilege Escalation Risk author: songyaeji severity: high description:> If the automountd service is enabled, a local attacker may execute arbitrary commands using root privileges by exploiting automatic mount options. This misconfiguration can lead to local privilege escalation. reference: - https://isms.kisa.or.kr - Cloud Vulnerability Assessment Guide(2024) by KISA tags: linux,automountd,service,privilege-escalation,misconfiguration,local metadata: verified:true os: linux max-request:1 classification: cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score:7.8 cwe-id: CWE-269
self-contained:true
code: -engine: - bash source: | if ps -ef | grep -v grep | grep -q automountd; then echo "[VULNERABLE] automountd service is running" else echo "[SAFE] automountd service is not running" fi matchers: -type: word part: code_1_response words: -"[VULNERABLE] automountd service is running"