finger-service-enabled: Linux Finger Should Be Disabled

日期: 2025-08-01 | 影响软件: finger service enabled | POC: 已公开

漏洞描述

The Finger service was enabled on the system and exposed user account details to unauthorized users, which could have been used in password-based attacks or user enumeration.It was checked in both xinetd and systemd environments.

PoC代码[已公开]

id: finger-service-enabled

info:
  name: Linux Finger Should Be Disabled
  author: songyaeji
  severity: high
  description: |
    The Finger service was enabled on the system and exposed user account details to unauthorized users, which could have been used in password-based attacks or user enumeration.It was checked in both xinetd and systemd environments.
  reference:
    - https://isms.kisa.or.kr
  tags: linux,local,code,audit,compliance,kisas

self-contained: true

code:
  - engine:
      - sh
      - bash
    source: |
      if [ -f /etc/xinetd.d/finger ]; then
        disable_status=$(grep -i 'disable' /etc/xinetd.d/finger | grep -v '^#' | awk -F '=' '{print $2}' | xargs)
        if [ "$disable_status" = "no" ]; then
          echo "[VULNERABLE] Finger service is enabled via xinetd (disable = no)"
        elif [ -z "$disable_status" ]; then
          echo "[UNKNOWN] Finger service config found but no disable directive"
        else
          echo "[SAFE] Finger service is disabled in xinetd"
        fi
      elif systemctl is-active --quiet finger 2>/dev/null; then
        echo "[VULNERABLE] Finger service is active under systemd"
      else
        echo "[SAFE] Finger service not found"
      fi

    matchers:
      - type: word
        part: response
        words:
          - "[VULNERABLE]"
# digest: 4b0a00483046022100fd961710afcaa51c59ad26cd14dac20be07b92c68df9117ecfd3378b7a38a947022100824452bade1c3d45e18321b7ab0e61b3bd6cad55e57ae2180a8c5df4618d7ea5:922c64590222798bb761d5b6d8e72950