From a578e889ee1a9a8bb04b6d740e2f4edf26dabeed Mon Sep 17 00:00:00 2001 From: "thibault.dewailly" Date: Tue, 5 Apr 2016 13:42:05 +0200 Subject: [PATCH] 2.17_sticky_bit_world_writable_folder.sh --- .../2.17_sticky_bit_world_writable_folder.sh | 55 +++++++++++++++++++ etc/conf.d/2.16_run_shm_noexec.cfg | 2 +- .../2.17_sticky_bit_world_writable_folder.cfg | 2 + 3 files changed, 58 insertions(+), 1 deletion(-) create mode 100755 bin/hardening/2.17_sticky_bit_world_writable_folder.sh create mode 100644 etc/conf.d/2.17_sticky_bit_world_writable_folder.cfg diff --git a/bin/hardening/2.17_sticky_bit_world_writable_folder.sh b/bin/hardening/2.17_sticky_bit_world_writable_folder.sh new file mode 100755 index 0000000..99d8025 --- /dev/null +++ b/bin/hardening/2.17_sticky_bit_world_writable_folder.sh @@ -0,0 +1,55 @@ +#!/bin/bash + +# +# CIS Debian 7 Hardening +# + +# +# Hardening script skeleton replace this line with proper point treated +# + +set -e # One error, it's over +set -u # One variable unset, it's over + +# This function will be called if the script status is on enabled / audit mode +audit () { + info "Checking if setuid is set on world writable Directories" + RESULT=$(df --local -P | awk {'if (NR!=1) print $6'} | xargs -I '{}' find '{}' -xdev -type d \( -perm -0002 -a ! -perm -1000 \) -print 2>/dev/null) + if [ ! -z "$RESULT" ]; then + crit "Some world writable directories are not on sticky bit mode !" + FORMATTED_RESULT=$(sed "s/ /\n/g" <<< $RESULT | sort | uniq | tr '\n' ' ') + crit "$FORMATTED_RESULT" + else + ok "All world writable directories have a sticky bit" + fi +} + +# This function will be called if the script status is on enabled mode +apply () { + RESULT=$(df --local -P | awk {'if (NR!=1) print $6'} | xargs -I '{}' find '{}' -xdev -type d \( -perm -0002 -a ! -perm -1000 \) -print 2>/dev/null) + if [ ! -z "$RESULT" ]; then + df --local -P | awk {'if (NR!=1) print $6'} | xargs -I '{}' find '{}' -xdev -type d -perm -0002 2>/dev/null | xargs chmod a+t + else + ok "All world writable directories have a sticky bit, nothing to apply" + fi +} + +# This function will check config parameters required +check_config() { + # No param for this function + : +} + +# Source Root Dir Parameter +if [ ! -r /etc/default/cis-hardenning ]; then + echo "There is no /etc/default/cis-hardenning file, cannot source CIS_ROOT_DIR variable, aborting" + exit 128 +else + . /etc/default/cis-hardenning + if [ -z $CIS_ROOT_DIR ]; then + echo "No CIS_ROOT_DIR variable, aborting" + fi +fi + +# Main function, will call the proper functions given the configuration (audit, enabled, disabled) +[ -r $CIS_ROOT_DIR/lib/main.sh ] && . $CIS_ROOT_DIR/lib/main.sh diff --git a/etc/conf.d/2.16_run_shm_noexec.cfg b/etc/conf.d/2.16_run_shm_noexec.cfg index e1e4502..acee522 100644 --- a/etc/conf.d/2.16_run_shm_noexec.cfg +++ b/etc/conf.d/2.16_run_shm_noexec.cfg @@ -1,2 +1,2 @@ # Configuration for script of same name -status=enabled +status=disabled diff --git a/etc/conf.d/2.17_sticky_bit_world_writable_folder.cfg b/etc/conf.d/2.17_sticky_bit_world_writable_folder.cfg new file mode 100644 index 0000000..acee522 --- /dev/null +++ b/etc/conf.d/2.17_sticky_bit_world_writable_folder.cfg @@ -0,0 +1,2 @@ +# Configuration for script of same name +status=disabled