CWE-65: Windows Hard Link
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product, when opening a file or directory, does not sufficiently handle when the name is associated with a hard link to a target that is outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
扩展描述
Failure for a system to check for hard links can result in vulnerability to different types of attacks. For example, an attacker can escalate their privileges if a file used by a privileged program is replaced with a hard link to a sensitive file (e.g. AUTOEXEC.BAT). When the process opens the file, the attacker can assume the privileges of that process, or prevent the program from accurately processing data.
常见后果
影响范围: Confidentiality Integrity
技术影响: Read Files or Directories Modify Files or Directories
潜在缓解措施
阶段: Architecture and Design
策略: Separation of Privilege
观察示例
参考: CVE-2002-0725
File system allows local attackers to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.
参考: CVE-2003-0844
Web server plugin allows local users to overwrite arbitrary files via a symlink attack on predictable temporary filenames.
引入模式
| 阶段 | 说明 |
|---|---|
| Implementation | - |
| Operation | - |
适用平台
编程语言
操作系统
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Windows hard link | - |
| CERT C Secure Coding | FIO05-C | Identify files using multiple file attributes | - |
| Software Fault Patterns | SFP18 | Link in resource name resolution | - |