Einführungsmodi
Architecture and Design
Implementation : REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Operation
Anwendbare Plattformen
Sprache
Class: Not Language-Specific (Undetermined)
Häufige Konsequenzen
| Bereich |
Auswirkung |
Wahrscheinlichkeit |
Confidentiality Integrity | Read Application Data, Modify Application Data
Note: An attacker could read and modify data for which they do not have permissions to access directly. | |
Beobachtete Beispiele
| Referenzen |
Beschreibung |
| product installs binaries with potentially insecure user/group ownership |
| File system sets wrong ownership and group when creating a new file. |
| OS installs program with bin owner/group, allowing modification. |
| Manager does not properly restore ownership of a reusable resource when a user logs out, allowing privilege escalation. |
| Backup software restores symbolic links with incorrect uid/gid. |
| Product changes the ownership of files that a symlink points to, instead of the symlink itself. |
| Component assigns ownership of sensitive directory tree to a user account, which can be leveraged to perform privileged operations. |
Mögliche Gegenmaßnahmen
Phases : Policy
Periodically review the privileges and their owners.
Erkennungsmethoden
Automated Analysis
Use automated tools to check for privilege settings.
Hinweise zur Schwachstellen-Zuordnung
Begründung : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Kommentar : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Hinweise
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
Version |
| CWE Content Team |
MITRE |
2008-09-09 +00:00 |
2008-09-09 +00:00 |
1.0 |
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Potential_Mitigations, Time_of_Introduction |
| CWE Content Team |
MITRE |
2009-03-10 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2009-05-27 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences, Maintenance_Notes, Other_Notes |
| CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Common_Consequences, Relationships |
| CWE Content Team |
MITRE |
2012-10-30 +00:00 |
updated Observed_Examples, Potential_Mitigations |
| CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Applicable_Platforms, Modes_of_Introduction, Relationships |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Detection_Factors, Observed_Examples, Potential_Mitigations, Weakness_Ordinalities |