A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-1999-1193
untrusted user placed in unix "wheel" group
CVE: CVE-2005-2741
Product allows users to grant themselves certain rights that can be used to escalate privileges.
CVE: CVE-2005-2496
Product uses group ID of a user instead of the group, causing it to run with different privileges. This is resultant from some other unknown issue.
CVE: CVE-2004-0274
Product mistakenly assigns a particular status to an entity, leading to increased privileges.
N/A
N/A
Phase | Note |
---|---|
Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
Intro: The following example demonstrates the weakness.
seteuid(0); /* do some stuff */ seteuid(getuid());
Intro: The following example demonstrates the weakness.
AccessController.doPrivileged(new PrivilegedAction() { public Object run() { // privileged code goes here, for example: System.loadLibrary("awt"); return null; // nothing to return }
Intro: This application sends a special intent with a flag that allows the receiving application to read a data file for backup purposes.
Body: Any malicious application can register to receive this intent. Because of the FLAG_GRANT_READ_URI_PERMISSION included with the intent, the malicious receiver code can read the user's data.
Intent intent = new Intent(); intent.setAction("com.example.BackupUserData"); intent.setData(file_uri); intent.addFlags(FLAG_GRANT_READ_URI_PERMISSION); sendBroadcast(intent);