Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-283:Unverified Ownership
Weakness ID:283
Version:v4.17
Weakness Name:Unverified Ownership
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product does not properly verify that a critical resource is owned by the proper entity.

▼Extended Description

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowed-with-ReviewC282Improper Ownership Management
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 282
Name: Improper Ownership Management
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC723OWASP Top Ten 2004 Category A2 - Broken Access Control
MemberOfProhibitedC840Business Logic Errors
MemberOfProhibitedV884CWE Cross-section
MemberOfProhibitedC944SFP Secondary Cluster: Access Management
MemberOfProhibitedC1011Authorize Actors
MemberOfProhibitedC1396Comprehensive Categorization: Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 723
Name: OWASP Top Ten 2004 Category A2 - Broken Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 840
Name: Business Logic Errors
Nature: MemberOf
Mapping: Prohibited
Type:View
ID: 884
Name: CWE Cross-section
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 944
Name: SFP Secondary Cluster: Access Management
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1011
Name: Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1396
Name: Comprehensive Categorization: Access Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-280Separation of Privilege Strategy
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-332Gain Privileges or Assume Identity (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-280
Name: Separation of Privilege Strategy
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-332
Name: Gain Privileges or Assume Identity (impact)
▼Relevant To View
Relevant to the view"Architectural Concepts - (1008)"
NatureMappingTypeIDName
MemberOfProhibitedC1011Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1011
Name: Authorize Actors
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC840Business Logic Errors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 840
Name: Business Logic Errors
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC944SFP Secondary Cluster: Access Management
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 944
Name: SFP Secondary Cluster: Access Management
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
Access ControlN/AGain Privileges or Assume Identity

An attacker could gain unauthorized access to system resources.

Scope: Access Control
Likelihood: N/A
Impact: Gain Privileges or Assume Identity
Note:

An attacker could gain unauthorized access to system resources.

▼Potential Mitigations
Phase:Architecture and Design, Operation
Mitigation ID: MIT-1
Strategy:
Effectiveness:
Description:

Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.

Note:


Phase:Architecture and Design
Mitigation ID: MIT-49
Strategy: Separation of Privilege
Effectiveness:
Description:

Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.

Note:

▼Modes Of Introduction
Phase: Architecture and Design
Note:

REALIZATION: This weakness is caused during implementation of an architectural security tactic.

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
Example 1

This function is part of a privileged program that takes input from users with potentially lower privileges.

Language: ( code)
N/A

Language: Python(Bad code)
def killProcess(processID): os.kill(processID, signal.SIGKILL)

Language: ( code)
N/A

This code does not confirm that the process to be killed is owned by the requesting user, thus allowing an attacker to kill arbitrary processes.

Language: ( code)
N/A

This function remedies the problem by checking the owner of the process before killing it:

Language: Python(Good code)
def killProcess(processID): user = getCurrentUser() #Check process owner against requesting user* if getProcessOwner(processID) == user: os.kill(processID, signal.SIGKILL) return else: print("You cannot kill a process you don't own") return

▼Observed Examples
ReferenceDescription
CVE-2001-0178
Program does not verify the owner of a UNIX socket that is used for sending a password.
CVE-2004-2012
Owner of special device not checked, allowing root.
Reference: CVE-2001-0178
Description:
Program does not verify the owner of a UNIX socket that is used for sending a password.
Reference: CVE-2004-2012
Description:
Owner of special device not checked, allowing root.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      Relationship

      This overlaps insufficient comparison, verification errors, permissions, and privileges.

      N/A

      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      PLOVERN/AN/AUnverified Ownership
      Taxonomy Name: PLOVER
      Entry ID: N/A
      Fit: N/A
      Entry Name: Unverified Ownership
      ▼Related Attack Patterns
      IDName
      ▼References
      Details not found