CWE-65: Windows Hard Link

Variant Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product, when opening a file or directory, does not sufficiently handle when the name is associated with a hard link to a target that is outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.

扩展描述

Failure for a system to check for hard links can result in vulnerability to different types of attacks. For example, an attacker can escalate their privileges if a file used by a privileged program is replaced with a hard link to a sensitive file (e.g. AUTOEXEC.BAT). When the process opens the file, the attacker can assume the privileges of that process, or prevent the program from accurately processing data.

常见后果

影响范围: Confidentiality Integrity

技术影响: Read Files or Directories Modify Files or Directories

潜在缓解措施

阶段: Architecture and Design

策略: Separation of Privilege

观察示例

参考: CVE-2002-0725

File system allows local attackers to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.

参考: CVE-2003-0844

Web server plugin allows local users to overwrite arbitrary files via a symlink attack on predictable temporary filenames.

引入模式

阶段 说明
Implementation -
Operation -

适用平台

编程语言
Not Language-Specific (Undetermined)
操作系统
Windows (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Windows hard link -
CERT C Secure Coding FIO05-C Identify files using multiple file attributes -
Software Fault Patterns SFP18 Link in resource name resolution -
关键信息

CWE ID: CWE-65

抽象级别: Variant

结构: Simple

状态: Incomplete

相关弱点