漏洞描述
The Finger service was enabled on the system and exposed user account details to unauthorized users, which could have been used in password-based attacks or user enumeration.It was checked in both xinetd and systemd environments.
id: finger-service-enabled
info:
name: Linux Finger Should Be Disabled
author: songyaeji
severity: high
description: |
The Finger service was enabled on the system and exposed user account details to unauthorized users, which could have been used in password-based attacks or user enumeration.It was checked in both xinetd and systemd environments.
reference:
- https://isms.kisa.or.kr
tags: linux,local,code,audit,compliance,kisas
self-contained: true
code:
- engine:
- sh
- bash
source: |
if [ -f /etc/xinetd.d/finger ]; then
disable_status=$(grep -i 'disable' /etc/xinetd.d/finger | grep -v '^#' | awk -F '=' '{print $2}' | xargs)
if [ "$disable_status" = "no" ]; then
echo "[VULNERABLE] Finger service is enabled via xinetd (disable = no)"
elif [ -z "$disable_status" ]; then
echo "[UNKNOWN] Finger service config found but no disable directive"
else
echo "[SAFE] Finger service is disabled in xinetd"
fi
elif systemctl is-active --quiet finger 2>/dev/null; then
echo "[VULNERABLE] Finger service is active under systemd"
else
echo "[SAFE] Finger service not found"
fi
matchers:
- type: word
part: response
words:
- "[VULNERABLE]"
# digest: 4b0a00483046022100fd961710afcaa51c59ad26cd14dac20be07b92c68df9117ecfd3378b7a38a947022100824452bade1c3d45e18321b7ab0e61b3bd6cad55e57ae2180a8c5df4618d7ea5:922c64590222798bb761d5b6d8e72950