CWE-61: UNIX Symbolic Link (Symlink) Following
ID
CWE-61
Abstraction
Compound
Structure
Composite
Status
Incomplete
Number of CVEs
44
The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
A product that allows UNIX symbolic links (symlink) as part of paths whether in internal code or through user input can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read/write/corrupt a file that they originally did not have permissions to access.
Modes of Introduction
Phase | Note |
---|---|
Implementation | These are typically reported for temporary files or privileged programs. |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Language | Not Language-Specific |
Relationships
View | Weakness | |||||||
---|---|---|---|---|---|---|---|---|
# ID | View | Status | # ID | Name | Abstraction | Structure | Status | |
CWE-1000 | Research Concepts | Draft | CWE-59 | Improper Link Resolution Before File Access ('Link Following') | Base | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | Class | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-340 | Generation of Predictable Numbers or Identifiers | Class | Simple | Incomplete | |
CWE-1000 | Research Concepts | Draft | CWE-386 | Symbolic Name not Mapping to Correct Object | Base | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-732 | Incorrect Permission Assignment for Critical Resource | Class | Simple | Draft |
Common Attack Pattern Enumeration and Classification (CAPEC)
The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.
CAPEC at Mitre.orgCVEs Published
CVSS Severity
CVSS Severity - By Year
CVSS Base Score
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |
Loading...