SynopsisNessus was able to access sensitive information from remote NFS shares without having root privileges.
DescriptionNessus was either able to mount some of the NFS shares exported by the remote server or disclose potentially sensitive information such as a directory listing. An attacker may exploit this issue to gain read and possibly write access to files on remote host.
Note that root privileges were not required to mount the remote shares since the source port to mount the shares was higher than 1024.
SolutionConfigure NFS on the remote host so that only authorized hosts can mount the remote shares. The remote NFS server should prevent mount requests originating from a non-privileged port.
File Name: nfs_user_mount.nasl
Required KB Items: rpc/portmap, nfs/exportlist
Excluded KB Items: nfs/noshares