NIS/NIS+ Service Enabled

漏洞信息

漏洞名称: NIS/NIS+ Service Enabled

漏洞类型: 配置问题

漏洞等级: 高危

漏洞描述: NIS(网络信息服务)和NIS+(网络信息服务增强版)是用于在UNIX/Linux系统中集中管理用户和组信息的服务。这些服务如果配置不当或未正确保护,可能会成为攻击者的目标。本漏洞涉及在Linux系统上运行的NIS或NIS+服务,这些服务如果以不安全的方式运行,可能导致攻击者获取root权限或收集敏感用户信息。漏洞的技术根源在于这些服务的默认配置可能不够安全,或者管理员未能正确配置访问控制和加密措施。这种配置问题可能导致未经授权的访问和信息泄露,严重威胁系统的安全。攻击者可以利用这些服务中的漏洞,无需认证即可执行远程代码或获取敏感数据,从而对系统造成严重影响。因此,除非明确需要,否则强烈建议禁用这些服务以防止潜在的安全风险。

产品名称: NIS/NIS+

来源: https://github.com/projectdiscovery/nuclei-templates/blob/dfc176303ffebe3d9f231045fa3abe2cf2ca9874/misconfiguration%2Flinux%2Flinux-nis-nisplus-service-running.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43

id: linux-nis-nisplus-service-running

info:
name: NIS/NIS+ Service Enabled
author: songyaeji
severity: high
description: >
If insecure NIS or NIS+ services are running, attackers may gain root privileges or harvest sensitive user information.
It is strongly recommended to disable these services unless explicitly required.
reference:
- https://isms.kisa.or.kr
- Cloud Vulnerability Assessment Guide(2024) by KISA
tags: linux,nis,nisplus,misconfiguration,privilege-escalation,service
metadata:
verified: true
os: linux
category: nis
max-request: 1
classification:
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.8
cwe-id: CWE-732

self-contained: true

code:
- engine:
- bash
source: |
running=$(ps -ef | egrep "ypserv|ypbind|ypxfrd|rpc.yppasswdd|rpc.yppupdated" | grep -v grep)
if [ -n "$running" ]; then
echo "[VULNERABLE] NIS or NIS+ service is running"
echo "$running"
else
echo "[SAFE] NIS and NIS+ services are not running"
fi
matchers:
- type: word
part: code_1_response
words:
- "[VULNERABLE]"