CWE-520: .NET Misconfiguration: Use of Impersonation

Variant Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

Allowing a .NET application to run at potentially escalated levels of access to the underlying operating and file systems can be dangerous and result in various forms of attacks.

扩展描述

.NET server applications can optionally execute using the identity of the user authenticated to the client. The intention of this functionality is to bypass authentication and access control checks within the .NET application code. Authentication is done by the underlying web server (Microsoft Internet Information Service IIS), which passes the authenticated token, or unauthenticated anonymous token, to the .NET application. Using the token to impersonate the client, the application then relies on the settings within the NTFS directories and files to control access. Impersonation enables the application, on the server running the .NET application, to both execute code and access resources in the context of the authenticated and authorized user.

常见后果

影响范围: Access Control

技术影响: Gain Privileges or Assume Identity

潜在缓解措施

阶段: Operation

描述: Run the application with limited privilege to the underlying operating and file system.

引入模式

阶段 说明
Architecture and Design -
Implementation -
Operation -
关键信息

CWE ID: CWE-520

抽象级别: Variant

结构: Simple

状态: Incomplete

相关弱点