[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Obscured Security-relevant Information by Alternate Name

ID: 224Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Base





Description

The software records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation
  • Operation

Common Consequences

ScopeTechnical ImpactNotes
Non-Repudiation
Access_Control
 
Hide activities
Gain privileges / assume identity
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
  Avoid making decisions based on names of resources if those resources can have alternate names.
 
  

Relationships

Related CWETypeViewChain
CWE-224 ChildOf CWE-906 Category CWE-888  

Demonstrative Examples   (Details)

  1. This code prints the contents of a file if a user has permission.

Observed Examples

  1. CVE-2002-0725 : Attacker performs malicious actions on a hard link to a file, obscuring the real target file.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Obscured Security-relevant Information by Alternate Name
 
 

References:

  1. M. Howard D. LeBlanc .Writing Secure Code 2nd Edition. Microsoft. Published on 2002.

© SecPod Technologies