CWE-62 UNIX硬链接

admin 2021年12月16日16:17:51评论56 views字数 3019阅读10分3秒阅读模式

CWE-62 UNIX硬链接

结构: Simple

Abstraction: Variant

状态: Incomplete

被利用可能性: unkown

基本描述

The software, when opening a file or directory, does not sufficiently account for when the name is associated with a hard link to a target that is outside of the intended control sphere. This could allow an attacker to cause the software to operate on unauthorized files.

扩展描述

Failure for a system to check for hard links can result in vulnerability to different types of attacks. For example, an attacker can escalate their privileges if a file used by a privileged program is replaced with a hard link to a sensitive file (e.g. /etc/passwd). When the process opens the file, the attacker can assume the privileges of that process.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 59 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 59 cwe_View_ID: 699 cwe_Ordinal: Primary

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

Operating_System: {'cwe_Class': 'Unix', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity'] ['Read Files or Directories', 'Modify Files or Directories']

可能的缓解方案

MIT-48.1 Architecture and Design

策略: Separation of Privilege

Follow the principle of least privilege when assigning access rights to entities in a software system.
Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

分析过的案例

标识 说明 链接
CVE-2001-1494 Hard link attack, file overwrite; interesting because program checks against soft links https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1494
CVE-2002-0793 Hard link and possibly symbolic link following vulnerabilities in embedded operating system allow local users to overwrite arbitrary files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0793
CVE-2003-0578 Server creates hard links and unlinks files as root, which allows local users to gain privileges by deleting and overwriting arbitrary files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0578
CVE-1999-0783 Operating system allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0783
CVE-2004-1603 Web hosting manager follows hard links, which allows local users to read or modify arbitrary files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1603
CVE-2004-1901 Package listing system allows local users to overwrite arbitrary files via a hard link attack on the lockfiles. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1901
CVE-2005-0342 The Finder in Mac OS X and earlier allows local users to overwrite arbitrary files and gain privileges by creating a hard link from the .DS_Store file to an arbitrary file. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0342
CVE-2005-1111 Hard link race condition https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111
BUGTRAQ:20030203 ASA-0001 OpenBSD chpass/chfn/chsh file content leak http://www.securityfocus.com/archive/1/309962

Notes

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER UNIX hard link
CERT C Secure Coding FIO05-C Identify files using multiple file attributes
Software Fault Patterns SFP18 Link in resource name resolution

引用

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日16:17:51
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-62 UNIX硬链接https://cn-sec.com/archives/613076.html

发表评论

匿名网友 填写信息