漏洞描述
The /etc/syslog.conf or /etc/rsyslog.conf file was not owned by root or had insecure permissions,allowing attackers to manipulate logging settings to evade detection.
id: syslog-rsyslog-permission
info:
name: /etc/syslog and /etc/rsyslog.conf Permission Check
author: songyaeji
severity: high
description: |
The /etc/syslog.conf or /etc/rsyslog.conf file was not owned by root or had insecure permissions,allowing attackers to manipulate logging settings to evade detection.
reference:
- https://isms.kisa.or.kr
tags: linux,local,kisa,audit,compliance
self-contained: true
code:
- engine:
- sh
- bash
source: |
stat -c "%U %G %a" /etc/rsyslog.conf 2>/dev/null || echo "not-found"
- engine:
- sh
- bash
source: |
stat -c "%U %G %a" /etc/syslog.conf 2>/dev/null || echo "not-found"
matchers:
- type: regex
name: rsyslog
part: code_1_response
regex:
- '^root\s+root\s+(600|644)$'
- type: regex
name: syslog
part: code_2_response
regex:
- '^root\s+root\s+(600|644)$'
# digest: 4a0a00473045022057e616f66cdbb8c514a74c8b3d63748e4a400838e6e53d26b9dc1ff5f86796b2022100a6f9ca4535510294af9c6aef347cb8376c4ab27653abe22dae3bb0ad93d89d9a:922c64590222798bb761d5b6d8e72950