Do world-writable systemd .service
files created as symbolic links in /etc/systemd/system
impose a security threat?
Would it be possible to somehow modify the links to target arbitrary .service
files on the system, and make systemd execute those files as root?
The permissions for the /etc/systemd/system
directory is as follows:
drwxr-xr-x. 11 root root 4096 Aug 30 12:57 /etc/systemd/system/
and the world-writable links in this directory are:
1050594 0 lrwxrwxrwx 1 root root 9 Apr 9 11:53 /etc/systemd/system/ctrl-alt-del.target -> /dev/null
1050595 0 lrwxrwxrwx 1 root root 9 Apr 9 11:54 /etc/systemd/system/sensu-server.service -> /dev/null
1052003 0 lrwxrwxrwx 1 root root 9 Apr 9 11:54 /etc/systemd/system/sensu-api.service -> /dev/null
1052037 0 lrwxrwxrwx 1 root root 9 Apr 9 11:55 /etc/systemd/system/dataeng.service -> /dev/null