Improper Privilege Management |
Weakness ID: 269 (Weakness Base) | Status: Incomplete |
Description Summary
The software does not properly assign, modify, or track privileges for an actor, creating an unintended sphere of control for that actor.
Reference | Description |
---|---|
CVE-2001-1555 | Terminal privileges are not reset when a user logs out. |
CVE-2001-1514 | Does not properly pass security context to child processes in certain cases, allows privilege escalation. |
CVE-2001-0128 | Does not properly compute roles. |
Very carefully manage the setting, management and handling of privileges. Explicitly manage trust zones in the software. |
Follow the principle of least privilege when assigning access rights to entities in a software system. |
Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource. |
Ordinality | Description |
---|---|
Primary | (where the weakness exists independent of other weaknesses) |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Category | 265 | Privilege / Sandbox Issues | Development Concepts (primary)699 |
ChildOf | Weakness Class | 668 | Exposure of Resource to Wrong Sphere | Research Concepts1000 |
ChildOf | Weakness Class | 693 | Protection Mechanism Failure | Research Concepts (primary)1000 |
ParentOf | Weakness Class | 250 | Execution with Unnecessary Privileges | Research Concepts1000 |
ParentOf | Weakness Base | 266 | Incorrect Privilege Assignment | Research Concepts (primary)1000 |
ParentOf | Weakness Base | 267 | Privilege Defined With Unsafe Actions | Research Concepts (primary)1000 |
ParentOf | Weakness Base | 268 | Privilege Chaining | Research Concepts (primary)1000 |
ParentOf | Weakness Base | 270 | Privilege Context Switching Error | Development Concepts (primary)699 Research Concepts (primary)1000 |
ParentOf | Weakness Class | 271 | Privilege Dropping / Lowering Errors | Research Concepts (primary)1000 |
ParentOf | Weakness Base | 274 | Improper Handling of Insufficient Privileges | Research Concepts1000 |
ParentOf | Weakness Base | 648 | Incorrect Use of Privileged APIs | Research Concepts (primary)1000 |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
58 | Restful Privilege Elevation |
The relationships between privileges, permissions, and actors (e.g. users and groups) need further refinement within the Research view. One complication is that these concepts apply to two different pillars, related to control of resources (CWE-664) and protection mechanism failures (CWE-396). |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Team | Internal | ||
Moved this entry higher up in the Research view. | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Description, Maintenance Notes, Name, Relationships, Taxonomy Mappings, Weakness Ordinalities | ||||
2009-05-27 | CWE Content Team | MITRE | Internal | |
updated Name | ||||
2009-12-28 | CWE Content Team | MITRE | Internal | |
updated Potential Mitigations | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-09-09 | Privilege Management Error | |||
2009-05-27 | Insecure Privilege Management | |||