UCF STIG Viewer Logo

Cron must not execute group-writable or world-writable programs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-976 GEN003000 SV-64405r1_rule Medium
Description
If cron executes group-writable or world-writable programs, there is a possibility that unauthorized users could manipulate the programs with malicious intent. This could compromise system and network security.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2020-02-25

Details

Check Text ( C-52805r2_chk )
List all cronjobs on the system.
Procedure:

# ls /var/spool/cron

# ls /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly
or
# ls /etc/cron*|grep -v deny

If cron jobs exist under any of the above directories, use the following command to search for programs executed by cron:

# more

Perform a long listing of each program file found in the cron file to determine if the file is group-writable or world-writable.

# ls -la

If cron executes group-writable or world-writable files, this is a finding.
Fix Text (F-54987r2_fix)
Remove the world-writable and group-writable permissions from the cron program file(s) identified.

# chmod go-w