mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
40 lines
1.5 KiB
YAML
40 lines
1.5 KiB
YAML
id: finger-service-enabled
|
|
|
|
info:
|
|
name: Linux Finger Should Be Disabled
|
|
author: songyaeji
|
|
severity: high
|
|
description: |
|
|
The Finger service was enabled on the system and exposed user account details to unauthorized users, which could have been used in password-based attacks or user enumeration.It was checked in both xinetd and systemd environments.
|
|
reference:
|
|
- https://isms.kisa.or.kr
|
|
tags: linux,local,code,audit,compliance,kisas
|
|
|
|
self-contained: true
|
|
|
|
code:
|
|
- engine:
|
|
- sh
|
|
- bash
|
|
source: |
|
|
if [ -f /etc/xinetd.d/finger ]; then
|
|
disable_status=$(grep -i 'disable' /etc/xinetd.d/finger | grep -v '^#' | awk -F '=' '{print $2}' | xargs)
|
|
if [ "$disable_status" = "no" ]; then
|
|
echo "[VULNERABLE] Finger service is enabled via xinetd (disable = no)"
|
|
elif [ -z "$disable_status" ]; then
|
|
echo "[UNKNOWN] Finger service config found but no disable directive"
|
|
else
|
|
echo "[SAFE] Finger service is disabled in xinetd"
|
|
fi
|
|
elif systemctl is-active --quiet finger 2>/dev/null; then
|
|
echo "[VULNERABLE] Finger service is active under systemd"
|
|
else
|
|
echo "[SAFE] Finger service not found"
|
|
fi
|
|
|
|
matchers:
|
|
- type: word
|
|
part: response
|
|
words:
|
|
- "[VULNERABLE]"
|
|
# digest: 4b0a00483046022100fd961710afcaa51c59ad26cd14dac20be07b92c68df9117ecfd3378b7a38a947022100824452bade1c3d45e18321b7ab0e61b3bd6cad55e57ae2180a8c5df4618d7ea5:922c64590222798bb761d5b6d8e72950 |