CWE-269: Improper Privilege Management

Class Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

常见后果

影响范围: Access Control

技术影响: Gain Privileges or Assume Identity

潜在缓解措施

阶段: Architecture and Design Operation

描述: Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.

阶段: Architecture and Design

策略: Separation of Privilege

描述: Follow the principle of least privilege when assigning access rights to entities in a software system.

阶段: Architecture and Design

策略: Separation of Privilege

描述: Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2001-1555

Terminal privileges are not reset when a user logs out.

参考: CVE-2001-1514

Does not properly pass security context to child processes in certain cases, allows privilege escalation.

参考: CVE-2001-0128

Does not properly compute roles.

参考: CVE-1999-1193

untrusted user placed in unix "wheel" group

参考: CVE-2005-2741

Product allows users to grant themselves certain rights that can be used to escalate privileges.

参考: CVE-2005-2496

Product uses group ID of a user instead of the group, causing it to run with different privileges. This is resultant from some other unknown issue.

参考: CVE-2004-0274

Product mistakenly assigns a particular status to an entity, leading to increased privileges.

参考: CVE-2007-4217

FTP client program on a certain OS runs with setuid privileges and has a buffer overflow. Most clients do not need extra privileges, so an overflow is not a vulnerability for those clients.

参考: CVE-2007-5159

OS incorrectly installs a program with setuid privileges, allowing users to gain privileges.

参考: CVE-2008-4638

Composite: application running with high privileges (CWE-250) allows user to specify a restricted file to process, which generates a parsing error that leaks the contents of the file (CWE-209).

参考: CVE-2007-3931

Installation script installs some programs as setuid when they shouldn't be.

参考: CVE-2002-1981

Roles have access to dangerous procedures (Accessible entities).

参考: CVE-2002-1671

Untrusted object/method gets access to clipboard (Accessible entities).

参考: CVE-2000-0315

Traceroute program allows unprivileged users to modify source address of packet (Accessible entities).

参考: CVE-2000-0506

User with capability can prevent setuid program from dropping privileges (Unsafe privileged actions).

引入模式

阶段 说明
Architecture and Design -
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Operation -

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Privilege Management Error -
ISA/IEC 62443 Part 2-4 Req SP.03.08 BR -
ISA/IEC 62443 Part 3-2 Req CR 3.1 -
ISA/IEC 62443 Part 3-3 Req SR 1.2 -
ISA/IEC 62443 Part 3-3 Req SR 2.1 -
ISA/IEC 62443 Part 4-1 Req SD-3 -
ISA/IEC 62443 Part 4-1 Req SD-4 -
ISA/IEC 62443 Part 4-1 Req SI-1 -
ISA/IEC 62443 Part 4-2 Req CR 1.1 -
ISA/IEC 62443 Part 4-2 Req CR 2.1 -
关键信息

CWE ID: CWE-269

抽象级别: Class

结构: Simple

状态: Draft

利用可能性: Medium

相关弱点
相关攻击模式
CAPEC-122 CAPEC-233 CAPEC-58