linux-nisplus-service: NIS+ Service Should Be Disabled

日期: 2025-08-01 | 影响软件: linux nisplus service | POC: 已公开

漏洞描述

Evaluated the status of NIS+ service daemons on the system.Active NIS+ services could have permitted unauthorized users to escalate privileges or access sensitive account information, representing a significant security risk.

PoC代码[已公开]

id: linux-nisplus-service

info:
  name: NIS+ Service Should Be Disabled
  author: songyaeji
  severity: high
  description: |
    Evaluated the status of NIS+ service daemons on the system.Active NIS+ services could have permitted unauthorized users to escalate privileges or access sensitive account information, representing a significant security risk.
  reference:
    - https://isms.kisa.or.kr
  tags: linux,local,audit,kisa,compliance

self-contained: true

code:
  - engine:
      - sh
      - bash
    source: |
      if command -v systemctl >/dev/null 2>&1; then
          if systemctl is-active --quiet rpc.yppasswdd rpc.yppupdated ypxfrd; then
              echo "[VULNERABLE] NIS+ service is running"
              systemctl status rpc.yppasswdd rpc.yppupdated ypxfrd
          else
              echo "[SAFE] NIS+ service is not running"
          fi
      else
          running=$(ps -ef | egrep "rpc.yppasswdd|rpc.yppupdated|ypxfrd" | grep -v grep)
          if [ -n "$running" ]; then
              echo "[VULNERABLE] NIS+ service is running"
              echo "$running"
          else
              echo "[SAFE] NIS+ service is not running"
          fi
      fi

    matchers:
      - type: word
        part: response
        words:
          - "[VULNERABLE]"
# digest: 4b0a00483046022100ec34476a472e1a3b3be1d9a49138bc89f071403a821f0a1faef12d98134ca6fa022100ca746f642a4eb1564535e3ceafdde417713b4d795f53ecd7c874cae12a7587f8:922c64590222798bb761d5b6d8e72950