When a product contains certain functions that perform operations requiring an elevated level of privilege, the caller of a privileged API must be careful to:
If the caller of the API does not follow these requirements, then it may allow a malicious user or process to elevate their privilege, hijack the process, or steal sensitive data.
For instance, it is important to know if privileged APIs do not shed their privileges before returning to the caller or if the privileged function might make certain assumptions about the data, context or state information passed to it by the caller. It is important to always know when and how privileged APIs can be called in order to ensure that their elevated level of privilege cannot be exploited.
Scope | Impact | Likelihood |
---|---|---|
Access Control | Gain Privileges or Assume Identity Note: An attacker may be able to elevate privileges. | |
Confidentiality | Read Application Data Note: An attacker may be able to obtain sensitive information. | |
Integrity Confidentiality Availability | Execute Unauthorized Code or Commands Note: An attacker may be able to execute code. |
References | Description |
---|---|
CVE-2003-0645 | A Unix utility that displays online help files, if installed setuid, could allow a local attacker to gain privileges when a particular file-opening function is called. |
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-107 | Cross Site Tracing Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server. |
CAPEC-234 | Hijacking a privileged process An adversary gains control of a process that is assigned elevated privileges in order to execute arbitrary code with those privileges. Some processes are assigned elevated privileges on an operating system, usually through association with a particular user, group, or role. If an attacker can hijack this process, they will be able to assume its level of privilege in order to execute their own code. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
Evgeny Lebanidze | Cigital | Draft 8 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Common_Consequences, Relationships | |
CWE Content Team | MITRE | updated Description, Potential_Mitigations | |
CWE Content Team | MITRE | updated Name, Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Common_Consequences, Description | |
CWE Content Team | MITRE | updated Description, Potential_Mitigations | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Applicable_Platforms, Enabling_Factors_for_Exploitation, Observed_Examples, Relationships | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes, Relationships |