CWE-65 Windows硬链接

admin 2021年11月6日14:50:55评论46 views字数 2007阅读6分41秒阅读模式

CWE-65 Windows硬链接

结构: Simple

Abstraction: Variant

状态: Incomplete

被利用可能性: unkown

基本描述

The software, when opening a file or directory, does not sufficiently handle when the name is associated with a hard link to a target that is outside of the intended control sphere. This could allow an attacker to cause the software to operate on unauthorized files.

扩展描述

Failure for a system to check for hard links can result in vulnerability to different types of attacks. For example, an attacker can escalate their privileges if a file used by a privileged program is replaced with a hard link to a sensitive file (e.g. AUTOEXEC.BAT). When the process opens the file, the attacker can assume the privileges of that process, or prevent the program from accurately processing data.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 59 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 59 cwe_View_ID: 699 cwe_Ordinal: Primary

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

Operating_System: {'cwe_Class': 'Windows', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity'] ['Read Files or Directories', 'Modify Files or Directories']

可能的缓解方案

MIT-48.1 Architecture and Design

策略: Separation of Privilege

Follow the principle of least privilege when assigning access rights to entities in a software system.
Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

分析过的案例

标识 说明 链接
CVE-2002-0725 File system allows local attackers to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0725
CVE-2003-0844 Web server plugin allows local users to overwrite arbitrary files via a symlink attack on predictable temporary filenames. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0844

Notes

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER Windows hard link
CERT C Secure Coding FIO05-C Identify files using multiple file attributes
Software Fault Patterns SFP18 Link in resource name resolution

引用

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年11月6日14:50:55
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-65 Windows硬链接http://cn-sec.com/archives/613652.html

发表评论

匿名网友 填写信息