Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-708:Incorrect Ownership Assignment
Weakness ID:708
Version:v4.17
Weakness Name:Incorrect Ownership Assignment
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product assigns an owner to a resource, but the owner is outside of the intended control sphere.

▼Extended Description

This may allow the resource to be manipulated by actors outside of the intended control sphere.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
CanAlsoBeDiscouragedC345Insufficient Verification of Data Authenticity
ChildOfAllowed-with-ReviewC282Improper Ownership Management
Nature: CanAlsoBe
Mapping: Discouraged
Type: Class
ID: 345
Name: Insufficient Verification of Data Authenticity
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 282
Name: Improper Ownership Management
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC723OWASP Top Ten 2004 Category A2 - Broken Access Control
MemberOfProhibitedC840Business Logic Errors
MemberOfProhibitedV884CWE Cross-section
MemberOfProhibitedC944SFP Secondary Cluster: Access Management
MemberOfProhibitedC1011Authorize Actors
MemberOfProhibitedC1396Comprehensive Categorization: Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 723
Name: OWASP Top Ten 2004 Category A2 - Broken Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 840
Name: Business Logic Errors
Nature: MemberOf
Mapping: Prohibited
Type:View
ID: 884
Name: CWE Cross-section
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 944
Name: SFP Secondary Cluster: Access Management
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1011
Name: Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1396
Name: Comprehensive Categorization: Access Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-318Modify Application Data (impact)
MemberOfProhibitedBSBOSS-328Read Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-318
Name: Modify Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-328
Name: Read Application Data (impact)
▼Relevant To View
Relevant to the view"Architectural Concepts - (1008)"
NatureMappingTypeIDName
MemberOfProhibitedC1011Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1011
Name: Authorize Actors
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC840Business Logic Errors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 840
Name: Business Logic Errors
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC944SFP Secondary Cluster: Access Management
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 944
Name: SFP Secondary Cluster: Access Management
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
ConfidentialityIntegrityN/ARead Application DataModify Application Data

An attacker could read and modify data for which they do not have permissions to access directly.

Scope: Confidentiality, Integrity
Likelihood: N/A
Impact: Read Application Data, Modify Application Data
Note:

An attacker could read and modify data for which they do not have permissions to access directly.

▼Potential Mitigations
Phase:Policy
Mitigation ID:
Strategy:
Effectiveness:
Description:

Periodically review the privileges and their owners.

Note:


Phase:Testing
Mitigation ID:
Strategy:
Effectiveness:
Description:

Use automated tools to check for privilege settings.

Note:

▼Modes Of Introduction
Phase: Architecture and Design
Note:

N/A

Phase: Implementation
Note:

REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Phase: Operation
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2007-5101
File system sets wrong ownership and group when creating a new file.
CVE-2007-4238
OS installs program with bin owner/group, allowing modification.
CVE-2007-1716
Manager does not properly restore ownership of a reusable resource when a user logs out, allowing privilege escalation.
CVE-2005-3148
Backup software restores symbolic links with incorrect uid/gid.
CVE-2005-1064
Product changes the ownership of files that a symlink points to, instead of the symlink itself.
CVE-2011-1551
Component assigns ownership of sensitive directory tree to a user account, which can be leveraged to perform privileged operations.
Reference: CVE-2007-5101
Description:
File system sets wrong ownership and group when creating a new file.
Reference: CVE-2007-4238
Description:
OS installs program with bin owner/group, allowing modification.
Reference: CVE-2007-1716
Description:
Manager does not properly restore ownership of a reusable resource when a user logs out, allowing privilege escalation.
Reference: CVE-2005-3148
Description:
Backup software restores symbolic links with incorrect uid/gid.
Reference: CVE-2005-1064
Description:
Product changes the ownership of files that a symlink points to, instead of the symlink itself.
Reference: CVE-2011-1551
Description:
Component assigns ownership of sensitive directory tree to a user account, which can be leveraged to perform privileged operations.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      Maintenance

      This overlaps verification errors, permissions, and privileges.

      A closely related weakness is the incorrect assignment of groups to a resource. It is not clear whether it would fall under this entry or require a different entry.

      N/A

      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      ▼References
      Details not found