Modes d'introduction
Architecture and Design
Implementation : REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Operation
Plateformes applicables
Langue
Class: Not Language-Specific (Undetermined)
Conséquences courantes
| Portée |
Impact |
Probabilité |
| Access Control | Gain Privileges or Assume Identity
Note: If privileges are not dropped, neither are access rights of the user. Often these rights can be prevented from being dropped. | |
Access Control Non-Repudiation | Gain Privileges or Assume Identity, Hide Activities
Note: If privileges are not dropped, in some cases the system may record actions as the user which is being impersonated rather than the impersonator. | |
Exemples observés
| Références |
Description |
| Program does not drop privileges after acquiring the raw socket. |
| Setuid program does not drop privileges after a parsing error occurs, then calls another program to handle the error. |
| Does not drop privileges in related groups when lowering privileges. |
| Does not drop privileges in related groups when lowering privileges. |
| Does not drop privileges before determining access to certain files. |
| Finger daemon does not drop privileges when executing programs on behalf of the user being fingered. |
| FTP server does not drop privileges if a connection is aborted during file transfer. |
| Program only uses seteuid to drop privileges. |
| Windows program running as SYSTEM does not drop privileges before executing other programs (many others like this, especially involving the Help facility). |
| Utility Manager launches winhlp32.exe while running with raised privileges, which allows local users to gain system privileges. |
| Setuid program does not drop privileges before executing program specified in an environment variable. |
| Setuid program does not drop privileges before processing file specified on command line. |
| Service on Windows does not drop privileges before using "view file" option, allowing code execution. |
Mesures d’atténuation potentielles
Phases : Architecture and Design
Phases : Architecture and Design // Operation
Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
Phases : Architecture and Design
Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
Notes de cartographie des vulnérabilités
Justification : This CWE entry is a Class and might have Base-level children that would be more appropriate
Commentaire : Examine children of this entry to see if there is a better fit
Notes
CWE-271, CWE-272, and CWE-250 are all closely related and possibly overlapping. CWE-271 is probably better suited as a category.
Références
REF-44
24 Deadly Sins of Software Security
Michael Howard, David LeBlanc, John Viega.
REF-62
The Art of Software Security Assessment
Mark Dowd, John McDonald, Justin Schuh.
Soumission
| Nom |
Organisation |
Date |
Date de publication |
Version |
| PLOVER |
|
2006-07-19 +00:00 |
2006-07-19 +00:00 |
Draft 3 |
Modifications
| Nom |
Organisation |
Date |
Commentaire |
| Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Time_of_Introduction |
| CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Description, Relationships, Taxonomy_Mappings, Weakness_Ordinalities |
| CWE Content Team |
MITRE |
2008-10-14 +00:00 |
updated Description, Maintenance_Notes |
| CWE Content Team |
MITRE |
2009-12-28 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2010-06-21 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2011-03-29 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences |
| CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Common_Consequences, Demonstrative_Examples, Observed_Examples, References, Relationships |
| CWE Content Team |
MITRE |
2012-10-30 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Applicable_Platforms, Causal_Nature, Modes_of_Introduction, Relationships |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-12-10 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |