结构: Simple
Abstraction: Base
状态: Incomplete
被利用可能性: unkown
The software records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.
cwe_Nature: ChildOf cwe_CWE_ID: 221 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 221 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Non-Repudiation', 'Access Control'] | ['Hide Activities', 'Gain Privileges or Assume Identity'] |
This code prints the contents of a file if a user has permission.
bad PHP
While the code logs a bad access attempt, it logs the user supplied name for the file, not the canonicalized file name. An attacker can obscure their target by giving the script the name of a link to the file they are attempting to access. Also note this code contains a race condition between the is_link() and readlink() functions (CWE-363).
标识 | 说明 | 链接 |
---|---|---|
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Obscured Security-relevant Information by Alternate Name |