CWE-61: UNIX Symbolic Link (Symlink) Following

ID CWE-61
Abstraction Compound
Structure Composite
Status Incomplete
Number of CVEs 44
The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.

A product that allows UNIX symbolic links (symlink) as part of paths whether in internal code or through user input can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read/write/corrupt a file that they originally did not have permissions to access.

Modes of Introduction

Phase Note
Implementation These are typically reported for temporary files or privileged programs.

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-59 Improper Link Resolution Before File Access ('Link Following') Base Simple Draft
CWE-1000 Research Concepts Draft CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Class Simple Draft
CWE-1000 Research Concepts Draft CWE-340 Generation of Predictable Numbers or Identifiers Class Simple Incomplete
CWE-1000 Research Concepts Draft CWE-386 Symbolic Name not Mapping to Correct Object Base Simple Draft
CWE-1000 Research Concepts Draft CWE-732 Incorrect Permission Assignment for Critical Resource Class Simple Draft

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-27 Leveraging Race Conditions via Symbolic Links CWE-61

CVEs Published

CVSS Severity

CVSS Severity - By Year

CVSS Base Score

# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...
Loading...