CWE-283: Unverified Ownership
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product does not properly verify that a critical resource is owned by the proper entity.
常见后果
影响范围: Access Control
技术影响: Gain Privileges or Assume Identity
说明: An attacker could gain unauthorized access to system resources.
潜在缓解措施
阶段: Architecture and Design Operation
描述: Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
阶段: Architecture and Design
策略: Separation of Privilege
描述: Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
观察示例
参考: CVE-2001-0178
Program does not verify the owner of a UNIX socket that is used for sending a password.
参考: CVE-2004-2012
Owner of special device not checked, allowing root.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Unverified Ownership | - |