System files were configured with world-writable (chmod o+w) permissions.Malicious users could modify them, leading to privilege escalation, backdoors, or service disruption.
reference:
- https://isms.kisa.or.kr
tags:linux,audit,compliance,kisa
self-contained:true
code:
- engine:
- sh
- bash
source:|
find / -type f -perm -0002 ! -path "/tmp/*" -exec ls -l {} \; 2>/dev/null