Weaknesses in this category occur with improper enforcement of sandbox environments, or the improper handling, assignment, or management of privileges.
|Mapped Taxonomy Name||Node ID||Fit||Mapped Node Name|
|PLOVER||Privilege / sandbox errors|
This can strongly overlap authorization errors.
A sandbox could be regarded as an explicitly defined sphere of control, in that the sandbox only defines a limited set of behaviors, which can only access a limited set of resources.
It could be argued that any privilege problem occurs within the context of a sandbox.
Many of the following concepts require deeper study. Most privilege problems are not classified at such a low level of detail, and terminology is very sparse. Certain classes of software, such as web browsers and software bug trackers, provide a rich set of examples for further research. Operating systems have matured to the point that these kinds of weaknesses are rare, but finer-grained models for privileges, capabilities, or roles might introduce subtler issues.
CWE-1102 依赖于机器相关的数据表示 Reliance on Machine-Dependent Data Representation 结构: Simple Abstraction: Base 状态: Incomplete 被利用可能性: unkown…