RHEL-06-000282 - There must be no world-writable files on the system.

Information

Data in world-writable files can be modified by any user on the system. In almost all circumstances, files can be configured using a combination of user and group permissions to support whatever legitimate access is needed without the risk caused by world-writable files.

Solution

It is generally a good idea to remove global (other) write access to a file when it is discovered. However, check with documentation for specific applications before making changes. Also, monitor for recurring world-writable files, as these may be symptoms of a misconfigured application or user account.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-218034r603264_rule, STIG-ID|RHEL-06-000282, STIG-Legacy|SV-50444, STIG-Legacy|V-38643, Vuln-ID|V-218034

Plugin: Unix

Control ID: 357459769f9e7c01ab9a648a5b71ec91986a4976b445fd44bcedfc78d8110978