info: name: NIS/NIS+ Service Enabled author: songyaeji severity: high description:> If insecure NIS or NIS+ services are running, attackers may gain root privileges or harvest sensitive user information. It is strongly recommended to disable these services unless explicitly required. reference: - https://isms.kisa.or.kr - Cloud Vulnerability Assessment Guide(2024) by KISA tags: linux,nis,nisplus,misconfiguration,privilege-escalation,service metadata: verified:true os: linux category: nis max-request:1 classification: cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:7.8 cwe-id: CWE-732
self-contained:true
code: -engine: - bash source: | running=$(ps -ef | egrep "ypserv|ypbind|ypxfrd|rpc.yppasswdd|rpc.yppupdated" | grep -v grep) if [ -n "$running" ]; then echo "[VULNERABLE] NIS or NIS+ service is running" echo "$running" else echo "[SAFE] NIS and NIS+ services are not running" fi matchers: -type: word part: code_1_response words: -"[VULNERABLE]"