Do world-writable systemd .service files created as symbolic links in /etc/systemd/system impose a security threat?
Would it be possible to somehow modify the links to target arbitrary .service files on the system, and make systemd execute those files as root?
The permissions for the /etc/systemd/system directory is as follows:
drwxr-xr-x. 11 root root 4096 Aug 30 12:57 /etc/systemd/system/
and the world-writable links in this directory are:
1050594 0 lrwxrwxrwx 1 root root 9 Apr 9 11:53 /etc/systemd/system/ctrl-alt-del.target -> /dev/null
1050595 0 lrwxrwxrwx 1 root root 9 Apr 9 11:54 /etc/systemd/system/sensu-server.service -> /dev/null
1052003 0 lrwxrwxrwx 1 root root 9 Apr 9 11:54 /etc/systemd/system/sensu-api.service -> /dev/null
1052037 0 lrwxrwxrwx 1 root root 9 Apr 9 11:55 /etc/systemd/system/dataeng.service -> /dev/null