#!/bin/bash # # CIS Debian Hardening # # # 13.5 Verify No UID 0 Accounts Exist Other Than root (Scored) # set -e # One error, it's over set -u # One variable unset, it's over HARDENING_LEVEL=2 DESCRIPTION="Verify root is the only UID 0 account." FILE='/etc/passwd' RESULT='' # This function will be called if the script status is on enabled / audit mode audit () { info "Checking if accounts have uid 0" RESULT=$(cat $FILE | awk -F: '($3 == 0 && $1!="root" ) { print $1 }') for ACCOUNT in $RESULT; do debug "Account : $ACCOUNT" debug "Exceptions : $EXCEPTIONS" debug "echo \"$EXCEPTIONS\" | grep -q $ACCOUNT" if echo "$EXCEPTIONS" | grep -q $ACCOUNT; then debug "$ACCOUNT is confirmed as an exception" RESULT=$(sed "s!$ACCOUNT!!" <<< "$RESULT") else debug "$ACCOUNT not found in exceptions" fi done if [ ! -z "$RESULT" ]; then crit "Some accounts have uid 0" crit $RESULT else ok "No account with uid 0 appart from root and potential configured exceptions" fi } # This function will be called if the script status is on enabled mode apply () { info "Removing accounts with uid 0 may seriously harm your system, report only here" } # This function will create the config file for this check with default values create_config() { cat <