CWE-269: Improper Privilege Management
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
常见后果
影响范围: Access Control
技术影响: Gain Privileges or Assume Identity
潜在缓解措施
阶段: Architecture and Design Operation
描述: Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
阶段: Architecture and Design
策略: Separation of Privilege
描述: Follow the principle of least privilege when assigning access rights to entities in a software system.
阶段: Architecture and Design
策略: Separation of Privilege
描述: Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
检测方法
方法: Automated Static Analysis
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
有效性: High
观察示例
参考: CVE-2001-1555
Terminal privileges are not reset when a user logs out.
参考: CVE-2001-1514
Does not properly pass security context to child processes in certain cases, allows privilege escalation.
参考: CVE-2001-0128
Does not properly compute roles.
参考: CVE-1999-1193
untrusted user placed in unix "wheel" group
参考: CVE-2005-2741
Product allows users to grant themselves certain rights that can be used to escalate privileges.
参考: CVE-2005-2496
Product uses group ID of a user instead of the group, causing it to run with different privileges. This is resultant from some other unknown issue.
参考: CVE-2004-0274
Product mistakenly assigns a particular status to an entity, leading to increased privileges.
参考: CVE-2007-4217
FTP client program on a certain OS runs with setuid privileges and has a buffer overflow. Most clients do not need extra privileges, so an overflow is not a vulnerability for those clients.
参考: CVE-2007-5159
OS incorrectly installs a program with setuid privileges, allowing users to gain privileges.
参考: CVE-2008-4638
Composite: application running with high privileges (CWE-250) allows user to specify a restricted file to process, which generates a parsing error that leaks the contents of the file (CWE-209).
参考: CVE-2007-3931
Installation script installs some programs as setuid when they shouldn't be.
参考: CVE-2002-1981
Roles have access to dangerous procedures (Accessible entities).
参考: CVE-2002-1671
Untrusted object/method gets access to clipboard (Accessible entities).
参考: CVE-2000-0315
Traceroute program allows unprivileged users to modify source address of packet (Accessible entities).
参考: CVE-2000-0506
User with capability can prevent setuid program from dropping privileges (Unsafe privileged actions).
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | - |
| Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
| Operation | - |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Privilege Management Error | - |
| ISA/IEC 62443 | Part 2-4 | Req SP.03.08 BR | - |
| ISA/IEC 62443 | Part 3-2 | Req CR 3.1 | - |
| ISA/IEC 62443 | Part 3-3 | Req SR 1.2 | - |
| ISA/IEC 62443 | Part 3-3 | Req SR 2.1 | - |
| ISA/IEC 62443 | Part 4-1 | Req SD-3 | - |
| ISA/IEC 62443 | Part 4-1 | Req SD-4 | - |
| ISA/IEC 62443 | Part 4-1 | Req SI-1 | - |
| ISA/IEC 62443 | Part 4-2 | Req CR 1.1 | - |
| ISA/IEC 62443 | Part 4-2 | Req CR 2.1 | - |
关键信息
CWE ID: CWE-269
抽象级别: Class
结构: Simple
状态: Draft
利用可能性: Medium