Synopsis
Potentially dangerous PATH variables are present in the PATH of the remote host.
Description
Potentially dangerous PATH variables are present in the PATH of the remote host, which could lead to privilege escalation by allowing non-administrator users to write files to the PATH directory.
This plugin fires on Unix when a directory in the PATH variable is world writable or if '.' (the current directory) is present in the PATH. This plugin also fires when the scan is paranoid and one of the following is true:
1) A directory in the PATH variable is not owned by root 2) A directory in the PATH variable has a group other than root and the group can write to the directory.
This plugin fires on Windows when paranoia is enabled and when a directory in the PATH variable is writable by one of the following unprivileged identity groups: BUILTIN\Users, NT AUTHORITY\Authenticated Users, anonymous, and everyone. It fires if one of these groups has full, write-only, modify, write owner, generic write, generic all, write data/add file, or write DAC permissions on the PATH directory
Solution
Ensure that directories listed here are in line with corporate policy.
Plugin Details
File Name: dangerous_paths.nbin
Agent: windows, macosx, unix
Supported Sensors: Nessus Agent, Nessus
Risk Information
CVSS Score Rationale: Score from an in depth analysis done by tenable
Vector: CVSS2#AV:L/AC:M/Au:S/C:P/I:P/A:P
CVSS Score Source: manual
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Vulnerability Information
Required KB Items: Host/PATH