Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

User Mountable NFS shares

Information

Severity

Severity

High

Family

Family

Remote file access

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Mitigation

Created

Created

15 years ago

Modified

Modified

5 years ago

Summary

It is possible to access the remote NFS shares without having root privileges.

Insight

Insight

Some of the NFS shares exported by the remote server could be mounted by the scanning host. An attacker may exploit this problem to gain read (and possibly write) access to files on remote host. Note that root privileges were not required to mount the remote shares. That is, the source port to mount the shares was bigger than 1024.

Solution

Solution

Configure NFS on the remote host so that only authorized hosts can mount the remote shares. The remote NFS server should prevent mount requests originating from a non-privileged port.