CWE-279: Incorrect Execution-Assigned Permissions
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
While it is executing, the product sets the permissions of an object in a way that violates the intended permissions that have been specified by the user.
常见后果
影响范围: Confidentiality Integrity
技术影响: Read Application Data Modify Application Data
潜在缓解措施
阶段: Architecture and Design Operation
描述: Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
阶段: Architecture and Design
策略: Separation of Privilege
观察示例
参考: CVE-2002-0265
Log files opened read/write.
参考: CVE-2003-0876
Log files opened read/write.
参考: CVE-2002-1694
Log files opened read/write.
引入模式
| 阶段 | 说明 |
|---|---|
| Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
| Architecture and Design | - |
| Operation | - |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Insecure execution-assigned permissions | - |
| CERT C Secure Coding | FIO06-C | Create files with appropriate access permissions | - |
| The CERT Oracle Secure Coding Standard for Java (2011) | FIO01-J | Create files with appropriate access permission | - |