Insecure Preserved Inherited Permissions |
Weakness ID: 278 (Weakness Variant) | Status: Incomplete |
Description Summary
Reference | Description |
---|---|
CVE-2005-1724 | Does not obey specified permissions when exporting. |
Very carefully manage the setting, management and handling of permissions. Explicitly manage trust zones in the software. |
Phase: Architecture and Design Ensure that appropriate compartmentalization is built into the system design and that the compartmentalization serves to allow for and further reinforce privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide when it is appropriate to use and to drop system privileges. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 275 | Permission Issues | Development Concepts (primary)699 |
ChildOf | ![]() | 732 | Incorrect Permission Assignment for Critical Resource | Research Concepts (primary)1000 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Insecure preserved inherited permissions |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.