Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4388 | GEN005020 | SV-35108r1_rule | ECSC-1 | Medium |
Description |
---|
If an anonymous FTP account does not use a chroot or similarly isolated environment, the system may be more vulnerable to exploits against the FTP service. Such exploits could allow an attacker to gain shell access to the system and view, edit, or remove sensitive files. |
STIG | Date |
---|---|
HP-UX 11.31 Security Technical Implementation Guide | 2017-12-08 |
Check Text ( C-36590r2_chk ) |
---|
Is FTP installed? # ls -lL /usr/lbin/ftpd If ftpd is not installed, this is not a finding. If ftpd is installed, determine if there is an anonymous ftp user configured in /etc/passwd. # cat /etc/passwd | egrep -c "^ftp|^anonymous" The /etc/passwd file, home directory entry for the anonymous FTP user should appear as the following example: ftp:4rL2xXxDatENY:509:159::/home/ftp/./:/usr/bin/false If there is an anonymous ftp user configured in /etc/passwd, determine if the ftp/anonymous user's home directory entry in the /etc/passwd file configured for chroot? # cat /etc/passwd | egrep "^ftp|^anonymous" | cut -f 6,6 -d ":" A dot (.) in field 6 of the FTP /etc/passwd file determines where the chroot will be performed. In the above example, the new root directory is /home/ftp. If an anonymous ftp user is found and the above command does not return an absolute path with a home directory of "dot" (see the above example), this is a finding. |
Fix Text (F-31957r2_fix) |
---|
Using the HP-SMH, configure the anonymous FTP service to operate in a chroot environment. |