The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation.

STIG ID: OL07-00-010350  |  SRG: SRG-OS-000373-GPOS-00156 | Severity: medium |  CCI: CCI-002038

Vulnerability Discussion

Without re-authentication, users may access resources or perform tasks for which they do not have authorization.

When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate.

Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158

Check

Verify the operating system requires users to reauthenticate for privilege escalation.

Check the configuration of the "/etc/sudoers" and "/etc/sudoers.d/*" files with the following command:

# grep -i authenticate /etc/sudoers /etc/sudoers.d/*

If any uncommented line is found with a "!authenticate" tag, this is a finding.

Fix

Configure the operating system to require users to reauthenticate for privilege escalation.

Check the configuration of the "/etc/sudoers" file with the following command:

# visudo
Remove any occurrences of "!authenticate" tags in the file.

Check the configuration of the "/etc/sudoers.d/*" files with the following command:

# grep -i authenticate /etc/sudoers /etc/sudoers.d/*
Remove any occurrences of "!authenticate" tags in the file(s).