Privilege / Sandbox Issues |
Category ID: 265 (Category) | Status: Incomplete |
Description Summary
Very carefully manage the setting, management and handling of privileges. Explicitly manage trust zones in the software. |
Follow the principle of least privilege when assigning access rights to entities in a software system. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 264 | Permissions, Privileges, and Access Controls | Development Concepts (primary)699 |
ParentOf | ![]() | 266 | Incorrect Privilege Assignment | Development Concepts (primary)699 |
ParentOf | ![]() | 267 | Privilege Defined With Unsafe Actions | Development Concepts (primary)699 |
ParentOf | ![]() | 268 | Privilege Chaining | Development Concepts (primary)699 |
ParentOf | ![]() | 269 | Improper Privilege Management | Development Concepts (primary)699 |
ParentOf | ![]() | 271 | Privilege Dropping / Lowering Errors | Development Concepts (primary)699 |
ParentOf | ![]() | 274 | Improper Handling of Insufficient Privileges | Development Concepts (primary)699 |
ParentOf | ![]() | 610 | Externally Controlled Reference to a Resource in Another Sphere | Development Concepts (primary)699 |
ParentOf | ![]() | 648 | Incorrect Use of Privileged APIs | Development Concepts (primary)699 |
PeerOf | ![]() | 250 | Execution with Unnecessary Privileges | Research Concepts1000 |
PeerOf | ![]() | 619 | Dangling Database Cursor ('Cursor Injection') | Research Concepts1000 |
Many of the following concepts require deeper study. Most privilege problems are not classified at such a low level of detail, and terminology is very sparse. Certain classes of software, such as web browsers and software bug trackers, provide a rich set of examples for further research. Operating systems have matured to the point that these kinds of weaknesses are rare, but finer-grained models for privileges, capabilities, or roles might introduce subtler issues. |
A sandbox could be regarded as an explicitly defined sphere of control, in that the sandbox only defines a limited set of behaviors, which can only access a limited set of resources. |
It could be argued that any privilege problem occurs within the context of a sandbox. |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Description, Relationships, Relationship Notes, Taxonomy Mappings, Theoretical Notes | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Description, Research Gaps, Theoretical Notes | ||||
2009-12-28 | CWE Content Team | MITRE | Internal | |
updated Potential Mitigations |