Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22351 | GEN001550 | SV-26453r1_rule | ECLP-1 | Medium |
Description |
---|
If a user's files are group-owned by a group where the user is not a member, unintended users may be able to access them. |
STIG | Date |
---|---|
VMware ESX 3 Server | 2016-05-13 |
Check Text ( C-40624r1_chk ) |
---|
Check the contents of user home directories for files group-owned by a group of which the home directory's owner is not a member. 1. List the user accounts. # cut -d : -f 1/etc/passwd 2. For each user account, get a list of GIDs for files in the user's home directory. # find < users home directory > -exec ls -lLd 3. Obtain the list of GIDs associated with the user's account. # id < user name > 4. Check the GID lists. If there are GIDs in the file list not present in the user list, this is a finding. |
Fix Text (F-23645r1_fix) |
---|
Change the group of a file not group-owned by a group where the home directory's owner is a member. # chgrp [user's primary group] [file with bad group ownership] |