NIS/NIS+ Service Enabled

漏洞信息

漏洞名称: NIS/NIS+ Service Enabled

漏洞类型: 配置问题

漏洞等级: 高危

漏洞描述: 该漏洞涉及Linux系统中NIS/NIS+服务的不安全配置问题。NIS(网络信息服务)和NIS+是其增强版本,广泛用于Unix和Linux系统中,用于集中管理用户和主机名等信息。由于这些服务在设计上存在安全隐患,如果配置不当或未禁用,攻击者可能利用这些服务获取root权限或收集敏感用户信息。漏洞的技术根源在于服务的不安全默认配置和缺乏必要的访问控制措施,使得攻击者能够通过网络访问这些服务并执行未授权操作。这种漏洞的影响极为严重,可能导致系统完全被控制,敏感数据泄露,甚至服务中断。由于攻击者无需认证即可利用此漏洞,且可以自动化执行,因此风险等级被评估为高危。建议除非明确需要,否则应禁用这些服务以防止潜在的安全威胁。

产品名称: NIS/NIS+

来源: https://github.com/projectdiscovery/nuclei-templates/blob/1dc5e4c5a7e3689548a72d7cb2a00b803fccc824/misconfiguration%2Flinux%2Flinux-nis-nisplus-service-running.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43

id: linux-nis-nisplus-service-running

info:
name: NIS/NIS+ Service Enabled
author: songyaeji
severity: high
description: >
If insecure NIS or NIS+ services are running, attackers may gain root privileges or harvest sensitive user information.
It is strongly recommended to disable these services unless explicitly required.
reference:
- https://isms.kisa.or.kr
- Cloud Vulnerability Assessment Guide(2024) by KISA
tags: linux,nis,nisplus,misconfiguration,privilege-escalation,service
metadata:
verified: true
os: linux
category: nis
max-request: 1
classification:
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.8
cwe-id: CWE-732

self-contained: true

code:
- engine:
- bash
source: |
running=$(ps -ef | egrep "ypserv|ypbind|ypxfrd|rpc.yppasswdd|rpc.yppupdated" | grep -v grep)
if [ -n "$running" ]; then
echo "[VULNERABLE] NIS or NIS+ service is running"
echo "$running"
else
echo "[SAFE] NIS and NIS+ services are not running"
fi
matchers:
- type: word
part: code_1_response
words:
- "[VULNERABLE]"