[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Unverified Ownership

ID: 283Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Base





Description

The software does not properly verify that a critical resource is owned by the proper entity.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Gain privileges / assume identity
 
An attacker could gain unauthorized access to system resources
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
Operation
 
 Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
 
  
Architecture and Design
 
Separation of Privilege
 
Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
 
  

Relationships
This overlaps insufficient comparison, verification errors, permissions, and privileges.

Related CWETypeViewChain
CWE-283 ChildOf CWE-899 Category CWE-888  

Demonstrative Examples   (Details)

  1. This function is part of a privileged program that takes input from users with potentially lower privileges.

Observed Examples

  1. CVE-2001-0178 : Program does not verify the owner of a UNIX socket that is used for sending a password.
  2. CVE-2004-2012 : Owner of special device not checked, allowing root.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Unverified Ownership
 
 

References:
None

CVE    1
CVE-2021-24501

© SecPod Technologies