Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-668:Exposure of Resource to Wrong Sphere
Weakness ID:668
Version:v4.17
Weakness Name:Exposure of Resource to Wrong Sphere
Vulnerability Mapping:Discouraged
Abstraction:Class
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

▼Extended Description

Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object. For example, a program may intend that private files can only be provided to a specific user. This effectively defines a control sphere that is intended to prevent attackers from accessing these private files. If the file permissions are insecure, then parties other than the user will be able to access those files.

A separate control sphere might effectively require that the user can only access the private files, but not any other files on the system. If the program does not ensure that the user is only requesting private files, then the user might be able to access other files on the system.

In either case, the end result is that a resource has been exposed to the wrong party.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfDiscouragedP664Improper Control of a Resource Through its Lifetime
ParentOfAllowedB1189Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
ParentOfAllowedB1282Assumed-Immutable Data is Stored in Writable Memory
ParentOfAllowedB1327Binding to an Unrestricted IP Address
ParentOfAllowedB1331Improper Isolation of Shared Resources in Network On Chip (NoC)
ParentOfAllowedB134Use of Externally-Controlled Format String
ParentOfDiscouragedC200Exposure of Sensitive Information to an Unauthorized Actor
ParentOfAllowedB22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
ParentOfAllowedB374Passing Mutable Objects to an Untrusted Method
ParentOfAllowedB375Returning a Mutable Object to an Untrusted Caller
ParentOfAllowed-with-ReviewC377Insecure Temporary File
ParentOfAllowed-with-ReviewC402Transmission of Private Resources into a New Sphere ('Resource Leak')
ParentOfAllowedV499Serializable Class Containing Sensitive Data
ParentOfAllowed-with-ReviewB427Uncontrolled Search Path Element
ParentOfAllowedB428Unquoted Search Path or Element
ParentOfAllowed-with-ReviewC441Unintended Proxy or Intermediary ('Confused Deputy')
ParentOfAllowedB488Exposure of Data Element to Wrong Session
ParentOfAllowedV491Public cloneable() Method Without Final ('Object Hijack')
ParentOfAllowedV492Use of Inner Class Containing Sensitive Data
ParentOfAllowedV493Critical Public Variable Without Final Modifier
ParentOfAllowedV498Cloneable Class Containing Sensitive Information
ParentOfAllowed-with-ReviewC522Insufficiently Protected Credentials
ParentOfAllowedB524Use of Cache Containing Sensitive Information
ParentOfAllowedB552Files or Directories Accessible to External Parties
ParentOfAllowedV582Array Declared Public, Final, and Static
ParentOfAllowedV583finalize() Method Declared Public
ParentOfAllowedV608Struts: Non-private Field in ActionForm Class
ParentOfAllowed-with-ReviewC642External Control of Critical State Data
ParentOfAllowed-with-ReviewC732Incorrect Permission Assignment for Critical Resource
ParentOfAllowedB767Access to Critical Private Variable via Public Method
ParentOfAllowedV8J2EE Misconfiguration: Entity Bean Declared Remote
ParentOfAllowedV927Use of Implicit Intent for Sensitive Communication
ParentOfAllowedV942Permissive Cross-domain Policy with Untrusted Domains
Nature: ChildOf
Mapping: Discouraged
Type: Pillar
ID: 664
Name: Improper Control of a Resource Through its Lifetime
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1189
Name: Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1282
Name: Assumed-Immutable Data is Stored in Writable Memory
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1327
Name: Binding to an Unrestricted IP Address
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1331
Name: Improper Isolation of Shared Resources in Network On Chip (NoC)
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 134
Name: Use of Externally-Controlled Format String
Nature: ParentOf
Mapping: Discouraged
Type: Class
ID: 200
Name: Exposure of Sensitive Information to an Unauthorized Actor
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 22
Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 374
Name: Passing Mutable Objects to an Untrusted Method
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 375
Name: Returning a Mutable Object to an Untrusted Caller
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 377
Name: Insecure Temporary File
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 402
Name: Transmission of Private Resources into a New Sphere ('Resource Leak')
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 499
Name: Serializable Class Containing Sensitive Data
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Base
ID: 427
Name: Uncontrolled Search Path Element
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 428
Name: Unquoted Search Path or Element
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 441
Name: Unintended Proxy or Intermediary ('Confused Deputy')
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 488
Name: Exposure of Data Element to Wrong Session
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 491
Name: Public cloneable() Method Without Final ('Object Hijack')
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 492
Name: Use of Inner Class Containing Sensitive Data
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 493
Name: Critical Public Variable Without Final Modifier
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 498
Name: Cloneable Class Containing Sensitive Information
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 522
Name: Insufficiently Protected Credentials
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 524
Name: Use of Cache Containing Sensitive Information
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 552
Name: Files or Directories Accessible to External Parties
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 582
Name: Array Declared Public, Final, and Static
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 583
Name: finalize() Method Declared Public
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 608
Name: Struts: Non-private Field in ActionForm Class
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 642
Name: External Control of Critical State Data
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 732
Name: Incorrect Permission Assignment for Critical Resource
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 767
Name: Access to Critical Private Variable via Public Method
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 8
Name: J2EE Misconfiguration: Entity Bean Declared Remote
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 927
Name: Use of Implicit Intent for Sensitive Communication
Nature: ParentOf
Mapping: Allowed
Type: Variant
ID: 942
Name: Permissive Cross-domain Policy with Untrusted Domains
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC963SFP Secondary Cluster: Exposed Data
MemberOfProhibitedV1003Weaknesses for Simplified Mapping of Published Vulnerabilities
MemberOfProhibitedC1011Authorize Actors
MemberOfProhibitedC1345OWASP Top Ten 2021 Category A01:2021 - Broken Access Control
MemberOfProhibitedC1364ICS Communications: Zone Boundary Failures
MemberOfProhibitedC1403Comprehensive Categorization: Exposed Resource
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 963
Name: SFP Secondary Cluster: Exposed Data
Nature: MemberOf
Mapping: Prohibited
Type:View
ID: 1003
Name: Weaknesses for Simplified Mapping of Published Vulnerabilities
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1011
Name: Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1345
Name: OWASP Top Ten 2021 Category A01:2021 - Broken Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1364
Name: ICS Communications: Zone Boundary Failures
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1403
Name: Comprehensive Categorization: Exposed Resource
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-318Modify Application Data (impact)
MemberOfProhibitedBSBOSS-326Varies by Context (impact)
MemberOfProhibitedBSBOSS-328Read Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-318
Name: Modify Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-326
Name: Varies by Context (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-328
Name: Read Application Data (impact)
▼Relevant To View
Relevant to the view"Architectural Concepts - (1008)"
NatureMappingTypeIDName
MemberOfProhibitedC1011Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1011
Name: Authorize Actors
Relevant to the view"OWASP Top Ten (2021) - (1344)"
NatureMappingTypeIDName
MemberOfProhibitedC1345OWASP Top Ten 2021 Category A01:2021 - Broken Access Control
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1345
Name: OWASP Top Ten 2021 Category A01:2021 - Broken Access Control
Relevant to the view"SEI ETF Categories of Security Vulnerabilities in ICS - (1358)"
NatureMappingTypeIDName
MemberOfProhibitedC1364ICS Communications: Zone Boundary Failures
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1364
Name: ICS Communications: Zone Boundary Failures
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC963SFP Secondary Cluster: Exposed Data
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 963
Name: SFP Secondary Cluster: Exposed Data
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
ConfidentialityHighRead Application Data

An adversary that gains access to a resource exposed to a wrong sphere could potentially retrieve private data from that resource, thus breaking the intended confidentiality of that data.

IntegrityMediumModify Application Data

An adversary that gains access to a resource exposed to a wrong sphere could potentially modify data held within that resource, thus breaking the intended integrity of that data and causing the system relying on that resource to make unintended decisions.

OtherN/AVaries by Context

The consequences may vary widely depending on how the product uses the affected resource.

Scope: Confidentiality
Likelihood: High
Impact: Read Application Data
Note:

An adversary that gains access to a resource exposed to a wrong sphere could potentially retrieve private data from that resource, thus breaking the intended confidentiality of that data.

Scope: Integrity
Likelihood: Medium
Impact: Modify Application Data
Note:

An adversary that gains access to a resource exposed to a wrong sphere could potentially modify data held within that resource, thus breaking the intended integrity of that data and causing the system relying on that resource to make unintended decisions.

Scope: Other
Likelihood: N/A
Impact: Varies by Context
Note:

The consequences may vary widely depending on how the product uses the affected resource.

▼Potential Mitigations
▼Modes Of Introduction
Phase: Architecture and Design
Note:

N/A

Phase: Implementation
Note:

REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Phase: Operation
Note:

N/A

▼Applicable Platforms
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Discouraged
      Reason:Frequent Misuse, Abstraction
      Rationale:

      CWE-668 is high-level and is often misused as a catch-all when lower-level CWE IDs might be applicable. It is sometimes used for low-information vulnerability reports [REF-1287]. It is a level-1 Class (i.e., a child of a Pillar). It is not useful for trend analysis.

      Comments:

      Closely analyze the specific mistake that is allowing the resource to be exposed, and perform a CWE mapping for that mistake.

      Suggestions:
      ▼Notes
      Theoretical

      A "control sphere" is a set of resources and behaviors that are accessible to a single actor, or a group of actors. A product's security model will typically define multiple spheres, possibly implicitly. For example, a server might define one sphere for "administrators" who can create new user accounts with subdirectories under /home/server/, and a second sphere might cover the set of users who can create or delete files within their own subdirectories. A third sphere might be "users who are authenticated to the operating system on which the product is installed." Each sphere has different sets of actors and allowable behaviors.

      N/A

      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      ▼References
      Reference ID: REF-1287
      Title: Supplemental Details - 2022 CWE Top 25
      Author: MITRE
      Section: Details of Problematic Mappings
      Publication:
      Publisher:
      Edition:
      URL:https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25_supplemental.html#problematicMappingDetails
      URL Date:2024-11-17
      Day:28
      Month:06
      Year:2022
      Details not found