9.6 Ensure root PATH Integrity - dot in path

Information

The root user can execute any command on the system and could be tricked into executing
programs if the PATH is not set correctly.

Including the current working directory (.) or any other writable directory in root's
executable path makes it likely that an attacker can gain superuser access by forcing an
administrator operating as root to execute a malcode, such as a Trojan horse program.

Solution

Correct or justify any items discovered in the Audit step.

See Also

https://workbench.cisecurity.org/files/616

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(2), CSCv6|8.4

Plugin: Unix

Control ID: 64f2b4c021bb44e3ba8f5093f46e4b964057f69790c19a97a1e7d84fa0a025e9