CINXE.COM

CWE - CWE-427: Uncontrolled Search Path Element (4.16)

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <?xml version="1.0" encoding="iso-8859-1"?> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head > <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <meta name="description" content="Common Weakness Enumeration (CWE) is a list of software weaknesses." /> <meta http-equiv="X-UA-Compatible" content="IE=Edge"> <link rel="shortcut icon" href="/favicon.ico" /> <link href="/css/main.css?version=4.0.022420" rel="stylesheet" type="text/css" /> <link href="/css/custom.css" rel="stylesheet" type="text/css" /> <!--[if IE]> <link rel="stylesheet" type="text/css" href="/css/ie.css?version=1.7" /> <![endif]--> <script src="/includes/custom_filter.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/browserheight.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/jquery.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/cwe_minimizer.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/cookie.js" language="JavaScript" type="text/javascript"></script> <script src="/includes/includeglossarydef.js" language="JavaScript" type="text/javascript"></script> <link href="/css/print.css?version=1.11" rel="stylesheet" media="print" type="text/css" /> <link href="/css/user_skins/complete.css" rel="stylesheet" type="text/css" /> <noscript> <style type="text/css"> #script { visibility:collapse; visibility:hidden; font-size:0px; height:0px; width:0px } #noscript { visibility:visible; font-size:inherit; height:inherit; width:inherit} </style> </noscript> <title>CWE - CWE-427: Uncontrolled Search Path Element (4.16) </title> </head> <body onload="onloadCookie()"> <a name="top" id="top"></a> <div id="MastHead" style="width:100%"> <div style="width:60%;float:left;padding-top:15px;padding-left:10px;padding-bottom:2px;"> <a href="/index.html" style="color:#32498D; text-decoration:none"> <img src="/images/cwe_logo.jpg" width="153" height="55" style="float:left;border:0;margin-right:6px" alt="CWE" /> <h1 style="color:#314a8d;font-size:1.5em;font-family:'Verdana',sans-serif;#eee;margin: .1em auto">Common Weakness Enumeration</h1> <p style="color:#314a8d;font-family:'Times New Roman';font-style:italic;font-size:1em;#eee;margin:.1em auto 0 auto">A community-developed list of SW &amp; HW weaknesses that can become vulnerabilities</p> </a> </div> <div style="float:right;padding-top:0px;text-align:right;padding-left:8px;padding-right:4px;padding-bottom:0px;"><a href="/about/new_to_cwe.html" title="New to CWE click here logo"><img src="/images/new_to_cwe/new_to_cwe_click_here.png" height="90" border="0" alt="New to CWE? click here!" style="text-align:center"/></a></div> <div style="float:right;padding-top:0px;text-align:right;padding-left:0px;padding-right:4px;padding-bottom:0px;"><a href="/scoring/lists/2021_CWE_MIHW.html" title="CWE Most Important Hardware Weaknesses"> <img src="/images/mihw_logo.svg" width="90" border="0" alt="CWE Most Important Hardware Weaknesses" style="vertical-align:bottom"/></a></div> <div style="float:right;padding-top:0px;text-align:right;padding-left:0px;padding-right:4px;padding-bottom:0px;"><a href="/top25/" title="CWE Top 25"><img src="/images/cwe_top_25_logo_simple.svg" width="90" border="0" alt="CWE Top 25 Most Dangerous Weaknesses" style="vertical-align:bottom"/></a></div> </div><!--End Masthead div--> <div id="HeaderBar" class="noprint"> <table width="100%" border="0" cellpadding="0" cellspacing="0"> <tr> <td width="100%" align="left" style="padding-left:10px; font-size:75%;"> <a href="/" >Home</a> &gt; <a href="/data/index.html" >CWE List</a> &gt; CWE-427: Uncontrolled Search Path Element (4.16) &nbsp; </td> <td align="right" nowrap="nowrap" style="padding-right:12px"> <!-- Begin /includes/search_cwe_id.html --> <div class="noprint"> <form action="/cgi-bin/jumpmenu.cgi" align="right" style="padding:0px; margin:0px"> ID <label for="id" style="padding-right:5px">Lookup:</label> <input id="id" name="id" type="text" style="width:50px; font-size:80%" maxlength="10" /> <input value="Go" style="padding: 0px; font-size:80%" type="submit"> </form> </div> <!-- End /includes/search_cwe_id.html --> </td> </tr> </table> </div> <!--//HeaderBar--> <div class="yesprint"> <hr width="100%" size="1" style="clear:both" color="#000000" /> </div> <div class="topnav"> <ul> <li><a href="/index.html">Home</a></li> <li> <div class="dropdown"> <a href="/about/index.html"><button class="dropbtn">About</button> &#x25BC;</a> <div class="dropdown-content"> <a href="/about/index.html">About</a> <a href="/about/new_to_cwe.html">New to CWE</a> <a href="/about/user_stories.html">User Stories</a> <a href="/about/cwe_videos.html">Videos</a> <a href="/about/history.html">History</a> <a href="/about/documents.html">Documents</a> <a href="/about/faq.html">FAQs</a> <a href="/documents/glossary/index.html">Glossary</a> </div> </div> </li> <li> <div class="dropdown"> <a href="/data/index.html"><button class="dropbtn">CWE List</button> &#x25BC;</a> <div class="dropdown-content"> <a href="/data/index.html">Latest Version</a> <a href="/data/downloads.html">Downloads</a> <a href="/data/reports.html">Reports</a> <a href="/data/pdfs.html">Visualizations</a> <a href="/data/archive.html">Archive</a> </div> </div> </li> <li> <div class="dropdown"> <a href="/documents/cwe_usage/guidance.html"><button class="dropbtn">Mapping</button> &#x25BC;</a> <div class="dropdown-content"> <a href="/documents/cwe_usage/guidance.html">Root Cause Mapping Guidance</a> <a href="/documents/cwe_usage/quick_tips.html">Root Cause Mapping Quick Tips</a> <a href="/documents/cwe_usage/mapping_examples.html">Root Cause Mapping Examples</a> </div> </div> </li> <li> <div class="dropdown"> <a href="/scoring/index.html#top_n_lists"><button class="dropbtn">Top-N Lists</button> &#x25BC;</a> <div class="dropdown-content"> <a href="/top25/">Top 25 Software</a> <a href="/scoring/lists/2021_CWE_MIHW.html">Top Hardware</a> <a href="/top25/archive/2023/2023_kev_list.html">Top 10 KEV Weaknesses</a> </div> </div> </li> <li> <div class="dropdown"> <a href="/community/index.html"><button class="dropbtn">Community</button> &#x25BC;</a> <div class="dropdown-content"> <a href="/community/index.html">Community</a> <a href="/community/working_groups.html">Working Groups &amp; Special Interest Groups</a> <a href="/community/board.html">Board</a> <a href="/community/board.html#boardarchives">Board Meeting Minutes</a> <a href="/community/registration.html">CWE Discussion List</a> <a target="_blank" href="https://www.mail-archive.com/cwe-research-list@mitre.org/">CWE Discussion Archives</a> <a href="/community/submissions/overview.html">Contribute Weakness Content to CWE</a> </div> </div> </li> <li> <div class="dropdown"> <a href="/news/"><button class="dropbtn">News</button> &#x25BC;</a> <div class="dropdown-content"> <a href="/news/">Current News</a> <a href="https://twitter.com/CweCapec" target="_blank" rel="noopener noreferrer">X-Twitter <img src="/images/x-logo-black.png" width="12" height="12" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" title="X-Twitter"></a> <a href="https://mastodon.social/@CWE_Program" target="_blank" rel="noopener noreferrer">Mastodon <img src="/images/mastodon-logo.png" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" title="X (formerly Twitter)"></a> <a href="https://www.linkedin.com/showcase/cve-cwe-capec" target="_blank" rel="noopener noreferrer">LinkedIn <img src="/images/linkedin_sm.jpg" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" title="LinkedIn"></a> <a href="https://www.youtube.com/channel/UCpY9VIpRmFK4ebD6orssifA" target="_blank" rel="noopener noreferrer">YouTube <img src="/images/youtube.png" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" alt="YouTube"></a> <a href="/news/podcast.html">Podcast <img src="/images/out_of_bounds_read_logo.png" width="16" height="16" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" alt="Out of Bounds Read Podcast"></a> <a href="https://medium.com/@CWE_CAPEC" target="_blank" rel="noopener noreferrer">Medium <img src="/images/medium_sm.png" width="14" height="14" style="position:relative; vertical-align:bottom; padding-left:3px; top:-1px" alt="Medium"></a> <a href="/news/archives/index.html">News Archive</a> </div> </li> <li style="border-color:#aaaaaa"><a href="/find/index.html">Search</a></li> </ul> </div> <table width="100%" border="0" cellspacing="0" cellpadding="0" id="MainPane"> <tr> <!-- begin left side menu --> <td valign="top" rowspan="2" id="LeftPane"> <!--include virtual="/includes/leftsidemenu.html" Removed 11212016--> <script type="text/javascript">browserheight();</script> </td> <!-- end left side menu --> <td style="height:1px"></td> <!-- begin right column --> <td valign="top" align="center" rowspan="2" nowrap="nowrap" id="RightPane"> </td> <!-- end right side menu --> </tr> <tr> <!-- begin content pane --> <td valign="top" width="100%" id="Contentpane"> <!--Glossary tags--> <div id="styled_popup" name="styled_popup" style="display:none; position:fixed; top:300; height:auto; width:300px; z-index:1000"> <table width="300" cellpadding="0" cellspacing="0" border="0" style="border:1px solid #32498D;"> <tr style="background-color:#32498D; color:#ffffff;"> <td width="100%" style="padding:1px 5px 1px 5px; border-bottom:1px solid #000000"><div width="100%" style="font-weight:bold;">CWE Glossary Definition</div></td> <td nowrap="nowrap" style="padding:1px; border-bottom:1px solid #000000" valign="top"><a href="javascript:styledPopupClose();"><img src="/images/layout/close.gif" border="0" alt="x"></a></td> </tr> <tr><td colspan="2" style="background: url(/images/layout/ylgradient.jpg); background-repeat: repeat-x repeat-y; padding:5px; background-color:#FFFFCC; " valign="top"> <div id="output" style="max-height:400px; overflow-y:auto"></div> </td></tr> </table> </div> <script src="/includes/nav.js" language="JavaScript" type="text/javascript" /></script> <noscript> <style>div.collapseblock { display:inline} </style> </noscript> <!-- Start main content --> <html xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" encoding="iso-8859-1"> <!-- Copyright (c) 2006-2024, The MITRE Corporation. CWE and the CWE logo are trademarks of The MITRE Corporation. --> <a xmlns:xhtml="http://www.w3.org/1999/xhtml" name="427"></a> <div style="overflow:auto;"> <h2 style="display:inline; margin:0px 0px 2px 0px; vertical-align: text-bottom">CWE-427: Uncontrolled Search Path Element</h2> <div style="text-align:right; margin:5px 0px 0px 5px; padding-bottom:1px; white-space:nowrap;"></div> </div> <div xmlns:xhtml="http://www.w3.org/1999/xhtml" id="CWEDefinition" class="Weakness"> <div class="title"> <div class="status"> <table cellpadding="0" cellspacing="0" border="0" width="100%"> <tbody> <tr> <td valign="top" align="left" width="33%" nowrap> <div style="font-weight:bold"> Weakness ID: 427 </div><span> <span style="font-weight:bold"> <a href="#Vulnerability_Mapping_Notes_427">Vulnerability Mapping</a>:<span class="tool"> <span style="color:#4E8F4A">ALLOWED</span> <span class="tip">This CWE ID may be used to map to real-world vulnerabilities</span> </span> </span> <br> <span class="tool">Abstraction: <span style="font-weight:normal">Base</span> <span class="tip">Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.</span> </span> </span> </td> </tr> </tbody> </table> </div> </div> <div id="Filter_Menu" style="padding-bottom:10px;"> <div style="min-width:580px;display:inline-flex;" class="filterButtonList"> <div style="font-size:80%; color:#000066; font-style:italic; display:inline;height:40px;line-height:40px;min-width:200px;">View customized information: </div> <span class="tool"> <button id="ConceptualButton" type="button" onclick="selectButtonSkin('conceptual');">Conceptual</button> <span class='filter-tip'>For users who are interested in more notional aspects of a weakness. Example: educators, technical writers, and project/program managers.</span> </span> <span class="tool"> <button id="OperationalButton" type="button" onclick="selectButtonSkin('operational');">Operational</button> <span class='filter-tip'>For users who are concerned with the practical application and details about the nature of a weakness and how to prevent it from happening. Example: tool developers, security researchers, pen-testers, incident response analysts.</span> </span> <span class="tool"> <button id="MappingFriendlyButton" type="button" onclick="selectButtonSkin('mappingfriendly');">Mapping Friendly</button> <span class='filter-tip'>For users who are mapping an issue to CWE/CAPEC IDs, i.e., finding the most appropriate CWE for a specific issue (e.g., a CVE record). Example: tool developers, security researchers.</span> </span> <span class="tool"> <button id="CompleteButton" type="button" onclick="selectButtonSkin('complete');">Complete</button> <span class='filter-tip'>For users who wish to see all available information for the CWE/CAPEC entry.</span> </span> <span class="tool"> <button id="CustomButton" type="button" onclick="openCustomFilterModal();">Custom</button> <span class='filter-tip'>For users who want to customize what details are displayed.</span> </span> </div> <!-- The Modal --> <div id="customFilterModal" class="custom-filter-modal"> <!-- Modal content --> <div class="custom-filter-modal-content"> <span class="close" onclick="cancelCustomFilter();">&times;</span> <br> <h2 id="customFilterHeader" class="custom-filter-header">Edit Custom Filter</h2> <div id="customFilterCategories" class="custom-filter-categories"> <button class="modalFilterButton" onclick="selectCategory('conceptual')" title="For users who are interested in more notional aspects of a weakness. Example: educators, technical writers, and project/program managers.">Conceptual</button> <button class="modalFilterButton" onclick="selectCategory('operational')" title="For users who are concerned with the practical application and details about the nature of a weakness and how to prevent it from happening. Example: tool developers, security researchers, pen-testers, incident response analysts.">Operational</button> <button class="modalFilterButton" onclick="selectCategory('mappingfriendly')" title="For users who are mapping an issue to CWE/CAPEC IDs, i.e., finding the most appropriate CWE for a specific issue (e.g., a CVE record). Example: tool developers, security researchers.">Mapping Friendly</button> <button class="modalFilterButton" onclick="selectCategory('complete')" title="For users who wish to see all available information for the CWE/CAPEC entry">Select All</button> </div> <div id="customFilterMainBox" class="custom-filter-main-box"> <div id="customFilterLeftBox"> </div> <div id="customFilterRightBox"> </div> </div> <br> <div id="customFilterButtons" class="custom-filter-buttons"> <button class="modalFilterButton" onclick="defaultCustomFilter()" title="Reset the selected elements to the current custom filter setting.">Reset</button> <button class="modalFilterButton" onclick="clearCustomFilter();" title="Clear all the selected elements so that nothing is selected.">Clear</button> <button class="modalFilterButton" onclick="submitCustomFilter();" title="Submit your changes for the custom filter">Submit</button> <button class="modalFilterButton" onclick="cancelCustomFilter();" title="Cancel all changes made to the custom filter">Cancel</button> </div> </div> </div> <style> div.filterButtonList button { height:25px; border-radius:10px; width: 150px; margin-left:15px; margin-right:15px; } /* The Modal (background) */ .custom-filter-modal { display: none; /* Hidden by default */ position: fixed; /* Stay in place */ z-index: 1; /* Sit on top */ padding-top: 100px; /* Location of the box */ left: 0; top: 0; width: 100%; /* Full width */ height: 100%; /* Full height */ overflow: auto; /* Enable scroll if needed */ background-color: rgb(0,0,0); /* Fallback color */ background-color: rgba(0,0,0,0.4); /* Black w/ opacity */ z-index: 9999; } /* Modal Content */ .custom-filter-modal-content { background-color: #fefefe; margin: auto; padding: 20px; border: 1px solid #888; width: 800px; min-width: 800px; border-radius: 25px; } /* The Close Button */ .close { color: #aaaaaa; float: right; font-size: 28px; font-weight: bold; } .close:hover, .close:focus { color: #000; text-decoration: none; cursor: pointer; } .custom-filter-header, .custom-filter-categories, .custom-filter-main-box, .custom-filter-buttons { padding: 0px; display: flex; align-items: center; justify-content: center; } #customFilterLeftBox { float: left; width: 250px; min-width: 250px; padding: 10px; display: inline-block; } #customFilterRightBox { float: right; width: 250px; min-width: 250px; padding: 10px; display: inline-block; } .modalFilterButton { height:25px !important; border-radius:12px !important; width: 150px !important; margin-left:10px !important; margin-right:10px !important; } </style> <script> // When the user clicks anywhere outside of the modal, close it var modal = document.getElementById("customFilterModal"); window.onclick = function(event) { if (event.target == document.getElementById("customFilterModal")) { modal.style.display = "none"; document.getElementById("customFilterLeftBox").innerHTML = ""; document.getElementById("customFilterRightBox").innerHTML = ""; } } </script> </div> <div id="Description"> <div class="heading" id="Description_427"> <span> <a href="javascript:toggleblocksOC('427_Description');"> <img id="ocimg_427_Description" src="/images/head_more.gif" border="0" alt="+"></a> </span>Description </div> <div name="oc_427_Description" id="oc_427_Description" class="expandblock"> <div class="detail"> <div class="indent">The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.</div> </div> </div> </div> <div id="Extended_Description"> <div class="heading" id="Extended_Description_427"> <span> <a href="javascript:toggleblocksOC('427_Extended_Description');"> <img id="ocimg_427_Extended_Description" src="/images/head_more.gif" border="0" alt="+"></a> </span>Extended Description </div> <div name="oc_427_Extended_Description" id="oc_427_Extended_Description" class="expandblock"> <div class="detail"> <div class="indent"> <p>Although this weakness can occur with any type of resource, it is frequently introduced when a product uses a directory search path to find executables or code libraries, but the path contains a directory that can be modified by an attacker, such as &#34;/tmp&#34; or the current working directory.</p> <p>In Windows-based systems, when the LoadLibrary or LoadLibraryEx function is called with a DLL name that does not contain a fully qualified path, the function follows a search order that includes two path elements that might be uncontrolled:</p> <ul> <li>the directory from which the program has been loaded</li> <li>the current working directory</li> </ul> <p>In some cases, the attack can be conducted remotely, such as when SMB or WebDAV network shares are used.</p> <p>One or more locations in that path could include the Windows drive root or its subdirectories. This often exists in Linux-based code assuming the controlled nature of the root directory (/) or its subdirectories (/etc, etc), or a code that recursively accesses the parent directory. In Windows, the drive root and some of its subdirectories have weak permissions by default, which makes them uncontrolled.</p> <p>In some Unix-based systems, a PATH might be created that contains an empty element, e.g. by splicing an empty variable into the PATH. This empty element can be interpreted as equivalent to the current working directory, which might be an untrusted search element.</p> <p>In software package management frameworks (e.g., npm, RubyGems, or PyPi), the framework may identify dependencies on third-party libraries or other packages, then consult a repository that contains the desired package. The framework may search a public repository before a private repository. This could be exploited by attackers by placing a malicious package in the public repository that has the same name as a package from the private repository. The search path might not be directly under control of the developer relying on the framework, but this search order effectively contains an untrusted element.</p> </div> </div> </div> </div> <div id="Alternate_Terms"> <div class="heading" id="Alternate_Terms_427"> <span> <a href="javascript:toggleblocksOC('427_Alternate_Terms');"> <img id="ocimg_427_Alternate_Terms" src="/images/head_more.gif" border="0" alt="+"></a> </span>Alternate Terms </div> <div name="oc_427_Alternate_Terms" id="oc_427_Alternate_Terms" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <th valign="top" nowrap> DLL preloading: </th> <td valign="top" width="100%"> <div class="indent">This term is one of several that are used to describe exploitation of untrusted search path elements in Windows systems, which received wide attention in August 2010. From a weakness perspective, the term is imprecise because it can apply to both <a href="/data/definitions/426.html">CWE-426</a> and <a href="/data/definitions/427.html">CWE-427</a>.</div> </td> </tr> <tr> <th valign="top" nowrap> Binary planting: </th> <td valign="top" width="100%"> <div class="indent">This term is one of several that are used to describe exploitation of untrusted search path elements in Windows systems, which received wide attention in August 2010. From a weakness perspective, the term is imprecise because it can apply to both <a href="/data/definitions/426.html">CWE-426</a> and <a href="/data/definitions/427.html">CWE-427</a>.</div> </td> </tr> <tr> <th valign="top" nowrap> Insecure library loading: </th> <td valign="top" width="100%"> <div class="indent">This term is one of several that are used to describe exploitation of untrusted search path elements in Windows systems, which received wide attention in August 2010. From a weakness perspective, the term is imprecise because it can apply to both <a href="/data/definitions/426.html">CWE-426</a> and <a href="/data/definitions/427.html">CWE-427</a>.</div> </td> </tr> <tr> <th valign="top" nowrap> Dependency confusion: </th> <td valign="top" width="100%"> <div class="indent">As of February 2021, this term is used to describe <a href="/data/definitions/427.html">CWE-427</a> in the context of managing installation of software package dependencies, in which attackers release packages on public sites where the names are the same as package names used by private repositories, and the search for the dependent package tries the public site first, downloading untrusted code. It may also be referred to as a &#34;substitution attack.&#34;</div> </td> </tr> </table> </div> </div> </div> </div> </div> <div id="Common_Consequences"> <div class="heading" id="Common_Consequences_427"><span><a href="javascript:toggleblocksOC('427_Common_Consequences');"><img id="ocimg_427_Common_Consequences" src="/images/head_more.gif" border="0" alt="+"></a> </span>Common Consequences</div> <div name="oc_427_Common_Consequences" id="oc_427_Common_Consequences" class="expandblock"> <div class="tabledetail"> <div class="indent"><span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">This table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.</span></span> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tr> <th valign="middle" width="135px" nowrap>Scope</th> <th valign="middle">Impact</th> <th valign="middle" width="100px" nowrap>Likelihood</th> </tr> <tr> <td valign="middle" nowrap>Confidentiality<br/>Integrity<br/>Availability</td> <td valign="middle" width="100%"> <div style="padding-top:5px"> <p class="smaller" style="font-weight:normal"> <span class="subheading">Technical Impact: </span><i>Execute Unauthorized Code or Commands</i> </p> </div> <div style="padding-top:5px"></div> </td> <td valign="middle" nowrap></td> </tr> </table> </div> </div> </div> </div> <div id="Potential_Mitigations"> <div class="heading" id="Potential_Mitigations_427"><span><a href="javascript:toggleblocksOC('427_Potential_Mitigations');"><img id="ocimg_427_Potential_Mitigations" src="/images/head_more.gif" border="0" alt="+"></a> </span>Potential Mitigations</div> <div name="oc_427_Potential_Mitigations" id="oc_427_Potential_Mitigations" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <td valign="top"> <p class="subheading">Phases: Architecture and Design; Implementation</p> <div class="indent"> <p class="suboptheading">Strategy: Attack Surface Reduction</p> </div> <div class="indent">Hard-code the search path to a set of known-safe values (such as system directories), or only allow them to be specified by the administrator in a configuration file. Do not allow these settings to be modified by an external party. Be careful to avoid related weaknesses such as <a href="/data/definitions/426.html">CWE-426</a> and <a href="/data/definitions/428.html">CWE-428</a>.</div> </td> </tr> <tr> <td valign="top"> <p class="subheading">Phase: Implementation</p> <div class="indent"> <p class="suboptheading">Strategy: Attack Surface Reduction</p> </div> <div class="indent">When invoking other programs, specify those programs using fully-qualified pathnames. While this is an effective approach, code that uses fully-qualified pathnames might not be portable to other systems that do not use the same pathnames. The portability can be improved by locating the full-qualified paths in a centralized, easily-modifiable location within the source code, and having the code refer to these paths.</div> </td> </tr> <tr> <td valign="top"> <p class="subheading">Phase: Implementation</p> <div class="indent"> <p class="suboptheading">Strategy: Attack Surface Reduction</p> </div> <div class="indent">Remove or restrict all environment settings before invoking other programs. This includes the PATH environment variable, LD_LIBRARY_PATH, and other settings that identify the location of code libraries, and any application-specific search paths.</div> </td> </tr> <tr> <td valign="top"> <p class="subheading">Phase: Implementation</p> <div class="indent">Check your search path before use and remove any elements that are likely to be unsafe, such as the current working directory or a temporary files directory. Since this is a denylist approach, it might not be a complete solution.</div> </td> </tr> <tr> <td valign="top"> <p class="subheading">Phase: Implementation</p> <div class="indent">Use other functions that require explicit paths. Making use of any of the other readily available functions that require explicit paths is a safe way to avoid this problem. For example, system() in C does not require a full path since the shell can take care of finding the program using the PATH environment variable, while execl() and execv() require a full path.</div> </td> </tr> </table> </div> </div> </div> </div> </div> <div id="Relationships"> <div class="heading" id="Relationships_427"> <span> <a href="javascript:toggleblocksOC('427_Relationships');"> <img id="ocimg_427_Relationships" src="/images/head_more.gif" border="0" alt="+"> </a> </span> Relationships </div> <div name="oc_427_Relationships" id="oc_427_Relationships" class="expandblock"> <div class="detail"> <div class="indent"> <span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"> <span><a href="javascript:toggleblocksOC('427_1000_relevant_table');"> <img id="ocimg_427_1000_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "Research Concepts" (CWE-1000) <div name="oc_427_1000_relevant_table" id="oc_427_1000_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> <tbody> <tr class="primary Weakness"> <td valign="top">ChildOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"> <span class="tool"><img src="/images/icons/class.gif" alt="Class" class="icon"> <span class="tip">Class - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.</span> </span> </td> <td valign="top"> 668 </td> <td valign="top"> <a href="/data/definitions/668.html" target="_blank" rel="noopener noreferrer">Exposure of Resource to Wrong Sphere</a> </td> </tr> <tr class="primary Weakness"> <td valign="top">PeerOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"> <span class="tool"><img src="/images/icons/base.gif" alt="Base" class="icon"> <span class="tip">Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.</span> </span> </td> <td valign="top"> 426 </td> <td valign="top"> <a href="/data/definitions/426.html" target="_blank" rel="noopener noreferrer">Untrusted Search Path</a> </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> <span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"> <span><a href="javascript:toggleblocksOC('427_699_relevant_table');"> <img id="ocimg_427_699_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "Software Development" (CWE-699) <div name="oc_427_699_relevant_table" id="oc_427_699_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> <tbody> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"> <span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"> <span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span> </span> </td> <td valign="top"> 1219 </td> <td valign="top"> <a href="/data/definitions/1219.html" target="_blank" rel="noopener noreferrer">File Handling Issues</a> </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> <span class="section tool"> <img src="/images/dictionary.gif" alt="Section Help"> <span class="tip">This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.</span> </span> <div id="relevant_table"> <div class="reltable"> <span><a href="javascript:toggleblocksOC('427_1003_relevant_table');"> <img id="ocimg_427_1003_relevant_table" src="/images/head_more.gif" border="0" alt="+"></a> </span>Relevant to the view "Weaknesses for Simplified Mapping of Published Vulnerabilities" (CWE-1003) <div name="oc_427_1003_relevant_table" id="oc_427_1003_relevant_table" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> <tbody> <tr class="primary Weakness"> <td valign="top">ChildOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"> <span class="tool"><img src="/images/icons/class.gif" alt="Class" class="icon"> <span class="tip">Class - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.</span> </span> </td> <td valign="top"> 668 </td> <td valign="top"> <a href="/data/definitions/668.html" target="_blank" rel="noopener noreferrer">Exposure of Resource to Wrong Sphere</a> </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div id="Modes_Of_Introduction"> <div class="heading" id="Modes_Of_Introduction_427"><span><a href="javascript:toggleblocksOC('427_Modes_Of_Introduction');"><img id="ocimg_427_Modes_Of_Introduction" src="/images/head_more.gif" border="0" alt="+"></a> </span>Modes Of Introduction</div> <div name="oc_427_Modes_Of_Introduction" id="oc_427_Modes_Of_Introduction" class="expandblock"> <div class="tabledetail"> <div class="indent"><span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">The different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.</span></span> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tr> <th valign="middle" width="110px">Phase</th> <th valign="middle">Note</th> </tr> <tr> <td valign="middle" nowrap>Implementation</td> <td valign="middle" width="100%"></td> </tr> </table> </div> </div> </div> </div> <div id="Applicable_Platforms"> <div class="heading" id="Applicable_Platforms_427"><span><a href="javascript:toggleblocksOC('427_Applicable_Platforms');"><img id="ocimg_427_Applicable_Platforms" src="/images/head_more.gif" border="0" alt="+"></a> </span>Applicable Platforms</div> <div name="oc_427_Applicable_Platforms" id="oc_427_Applicable_Platforms" class="expandblock"> <div class="detail"> <div class="indent"><span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">This listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.</span></span> <p class="subheading">Languages</p> <div class="indent"> <p> Class: Not Language-Specific <span class="smaller" style="font-style:italic">(Undetermined Prevalence)</span> </p> </div> <p class="subheading">Operating Systems</p> <div class="indent"> <p> Class: Not OS-Specific <span class="smaller" style="font-style:italic">(Undetermined Prevalence)</span> </p> </div> </div> </div> </div> </div> <div id="Demonstrative_Examples"> <div class="heading" id="Demonstrative_Examples_427"><span><a href="javascript:toggleblocksOC('427_Demonstrative_Examples');"><img id="ocimg_427_Demonstrative_Examples" src="/images/head_more.gif" border="0" alt="+"></a> </span>Demonstrative Examples</div> <div name="oc_427_Demonstrative_Examples" id="oc_427_Demonstrative_Examples" class="expandblock"> <div class="detail"> <div class="indent"> <p class="subheading">Example 1</p> <p>The following code is from a web application that allows users access to an interface through which they can update their password on the system. In this environment, user passwords can be managed using the Network Information System (NIS), which is commonly used on UNIX systems. When performing NIS updates, part of the process for updating passwords is to run a make command in the /var/yp directory. Performing NIS updates requires extra privileges.</p> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7">(bad code)</div> <div class="optheading smaller"> <span style="font-weight:normal; font-style:italic">Example Language: </span>Java&nbsp; </div> </div> <div class="top"> <div>...<br/>System.Runtime.getRuntime().exec(&#34;make&#34;);<br/>...</div> </div> </div> </div> </div> <p>The problem here is that the program does not specify an absolute path for make and does not clean its environment prior to executing the call to Runtime.exec(). If an attacker can modify the $PATH variable to point to a malicious binary called make and cause the program to be executed in their environment, then the malicious binary will be loaded instead of the one intended. Because of the nature of the application, it runs with the privileges necessary to perform system operations, which means the attacker&#39;s make will now be run with these privileges, possibly giving the attacker complete control of the system.</p> <br> <p class="subheading">Example 2</p> <p>In versions of Go prior to v1.19, the LookPath function would follow the conventions of the runtime OS and look for a program in the directiories listed in the current path [<a href="#REF-1325_427">REF-1325</a>].</p> <p>Therefore, Go would prioritize searching the current directory when the provided command name does not contain a directory separator and continued to search for programs even when the specified program name is empty.</p> <p>Consider the following where an application executes a git command to run on the system.</p> <div class="indent Bad"> <div id="ExampleCode" style="clear:both; padding-top:5px; padding-bottom:5px;"> <div class="shadow"> <div class="CodeHead"> <div style="float:right; font-style:italic; font-size:10px; color:#98A9B7">(bad code)</div> <div class="optheading smaller"> <span style="font-weight:normal; font-style:italic">Example Language: </span>Go&nbsp; </div> </div> <div class="top"> <div>func ExecuteGitCommand(name string, arg []string) error { <div style="margin-left:1em;"> c := exec.Command(name, arg...)<br/> var err error<br/> c.Path, err = exec.LookPath(name)<br/> if err != nil {<br/> <div style="margin-left:1em;"> return err<br/> </div> }</div> }</div> </div> </div> </div> </div> <p>An attacker could create a malicious repository with a file named ..exe and another file named git.exe. If git.exe is not found in the system PATH, then ..exe would execute [<a href="#REF-1326_427">REF-1326</a>].</p> <br> <p class="subheading">Example 3</p> <p>In February 2021 [<a href="#REF-1169_427">REF-1169</a>], a researcher was able to demonstrate the ability to breach major technology companies by using &#34;dependency confusion&#34; where the companies would download and execute untrusted packages.</p> <p>The researcher discovered the names of some internal, private packages by looking at dependency lists in public source code, such as package.json. The researcher then created new, untrusted packages with the same name as the internal packages, then uploaded them to package hosting services. These services included the npm registry for Node, PyPi for Python, and RubyGems. In affected companies, their dependency resolution would search the public hosting services first before consulting their internal service, causing the untrusted packages to be automatically downloaded and executed.</p> <br> </div> </div> </div> </div> <div id="Observed_Examples"> <div class="heading" id="Observed_Examples_427"><span><a href="javascript:toggleblocksOC('427_Observed_Examples');"><img id="ocimg_427_Observed_Examples" src="/images/head_more.gif" border="0" alt="+"></a> </span>Observed Examples</div> <div name="oc_427_Observed_Examples" id="oc_427_Observed_Examples" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <th valign="top" width="165px" nowrap>Reference</th> <th valign="top">Description</th> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2023-25815" target="_blank" rel="noopener noreferrer">CVE-2023-25815</a> </div> </td> <td valign="top"> <div class="indent">chain: a change in an underlying package causes the gettext function to use implicit initialization with a hard-coded path (<a href="/data/definitions/1419.html">CWE-1419</a>) under the user-writable C:\ drive, introducing an untrusted search path element (<a href="/data/definitions/427.html">CWE-427</a>) that enables spoofing of messages. </div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2022-4826" target="_blank" rel="noopener noreferrer">CVE-2022-4826</a> </div> </td> <td valign="top"> <div class="indent">Go-based git extension on Windows can search for and execute a malicious &#34;..exe&#34; in a repository because Go searches the current working directory if git.exe is not found in the PATH</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2020-26284" target="_blank" rel="noopener noreferrer">CVE-2020-26284</a> </div> </td> <td valign="top"> <div class="indent">A Static Site Generator built in Go, when running on Windows, searches the current working directory for a command, possibly allowing code execution using a malicious .exe or .bat file with the name being searched</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2022-24765" target="_blank" rel="noopener noreferrer">CVE-2022-24765</a> </div> </td> <td valign="top"> <div class="indent">Windows-based fork of git creates a &#34;.git&#34; folder in the C: drive, allowing local attackers to create a .git folder with a malicious config file</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2019-1552" target="_blank" rel="noopener noreferrer">CVE-2019-1552</a> </div> </td> <td valign="top"> <div class="indent">SSL package searches under &#34;C:/usr/local&#34; for configuration files and other critical data, but C:/usr/local might be world-writable.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-3402" target="_blank" rel="noopener noreferrer">CVE-2010-3402</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in document editor.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-3397" target="_blank" rel="noopener noreferrer">CVE-2010-3397</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in encryption software.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-3138" target="_blank" rel="noopener noreferrer">CVE-2010-3138</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in library used by multiple media players.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-3152" target="_blank" rel="noopener noreferrer">CVE-2010-3152</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in illustration program.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-3147" target="_blank" rel="noopener noreferrer">CVE-2010-3147</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in address book.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-3135" target="_blank" rel="noopener noreferrer">CVE-2010-3135</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in network monitoring software.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-3131" target="_blank" rel="noopener noreferrer">CVE-2010-3131</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in web browser.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2010-1795" target="_blank" rel="noopener noreferrer">CVE-2010-1795</a> </div> </td> <td valign="top"> <div class="indent">&#34;DLL hijacking&#34; issue in music player/organizer.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2002-1576" target="_blank" rel="noopener noreferrer">CVE-2002-1576</a> </div> </td> <td valign="top"> <div class="indent">Product uses the current working directory to find and execute a program, which allows local users to gain privileges by creating a symlink that points to a malicious version of the program.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-1999-1461" target="_blank" rel="noopener noreferrer">CVE-1999-1461</a> </div> </td> <td valign="top"> <div class="indent">Product trusts the PATH environmental variable to find and execute a program, which allows local users to obtain root access by modifying the PATH to point to a malicous version of that program.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-1999-1318" target="_blank" rel="noopener noreferrer">CVE-1999-1318</a> </div> </td> <td valign="top"> <div class="indent">Software uses a search path that includes the current working directory (.), which allows local users to gain privileges via malicious programs.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2003-0579" target="_blank" rel="noopener noreferrer">CVE-2003-0579</a> </div> </td> <td valign="top"> <div class="indent">Admin software trusts the user-supplied -uv.install command line option to find and execute the uv.install program, which allows local users to gain privileges by providing a pathname that is under control of the user.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2000-0854" target="_blank" rel="noopener noreferrer">CVE-2000-0854</a> </div> </td> <td valign="top"> <div class="indent">When a document is opened, the directory of that document is first used to locate DLLs , which could allow an attacker to execute arbitrary commands by inserting malicious DLLs into the same directory as the document.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2001-0943" target="_blank" rel="noopener noreferrer">CVE-2001-0943</a> </div> </td> <td valign="top"> <div class="indent">Database trusts the PATH environment variable to find and execute programs, which allows local users to modify the PATH to point to malicious programs.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2001-0942" target="_blank" rel="noopener noreferrer">CVE-2001-0942</a> </div> </td> <td valign="top"> <div class="indent">Database uses an environment variable to find and execute a program, which allows local users to execute arbitrary programs by changing the environment variable.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2001-0507" target="_blank" rel="noopener noreferrer">CVE-2001-0507</a> </div> </td> <td valign="top"> <div class="indent">Server uses relative paths to find system files that will run in-process, which allows local users to gain privileges via a malicious file.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2002-2017" target="_blank" rel="noopener noreferrer">CVE-2002-2017</a> </div> </td> <td valign="top"> <div class="indent">Product allows local users to execute arbitrary code by setting an environment variable to reference a malicious program.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-1999-0690" target="_blank" rel="noopener noreferrer">CVE-1999-0690</a> </div> </td> <td valign="top"> <div class="indent">Product includes the current directory in root&#39;s PATH variable.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2001-0912" target="_blank" rel="noopener noreferrer">CVE-2001-0912</a> </div> </td> <td valign="top"> <div class="indent">Error during packaging causes product to include a hard-coded, non-standard directory in search path.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2001-0289" target="_blank" rel="noopener noreferrer">CVE-2001-0289</a> </div> </td> <td valign="top"> <div class="indent">Product searches current working directory for configuration file.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2005-1705" target="_blank" rel="noopener noreferrer">CVE-2005-1705</a> </div> </td> <td valign="top"> <div class="indent">Product searches current working directory for configuration file.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2005-1307" target="_blank" rel="noopener noreferrer">CVE-2005-1307</a> </div> </td> <td valign="top"> <div class="indent">Product executable other program from current working directory.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2002-2040" target="_blank" rel="noopener noreferrer">CVE-2002-2040</a> </div> </td> <td valign="top"> <div class="indent">Untrusted path.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2005-2072" target="_blank" rel="noopener noreferrer">CVE-2005-2072</a> </div> </td> <td valign="top"> <div class="indent">Modification of trusted environment variable leads to untrusted path vulnerability.</div> </td> </tr> <tr> <td valign="top"> <div> <a href="https://www.cve.org/CVERecord?id=CVE-2005-1632" target="_blank" rel="noopener noreferrer">CVE-2005-1632</a> </div> </td> <td valign="top"> <div class="indent">Product searches /tmp for modules before other paths.</div> </td> </tr> </table> </div> </div> </div> </div> </div> <div id="Detection_Methods"> <div class="heading" id="Detection_Methods_427"><span><a href="javascript:toggleblocksOC('427_Detection_Methods');"><img id="ocimg_427_Detection_Methods" src="/images/head_more.gif" border="0" alt="+"></a> </span>Detection Methods</div> <div name="oc_427_Detection_Methods" id="oc_427_Detection_Methods" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <td valign="top"> <p class="subheading">Automated Static Analysis</p> <div class="indent">Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect &#34;sources&#34; (origins of input) with &#34;sinks&#34; (destinations where the data interacts with external components, a lower layer such as the OS, etc.)</div> <div class="indent"> <p class="suboptheading">Effectiveness: High</p> </div> </td> </tr> </table> </div> </div> </div> </div> </div> <div id="Memberships"> <div class="heading" id="Memberships_427"><span><a href="javascript:toggleblocksOC('427_Memberships');"><img id="ocimg_427_Memberships" src="/images/head_more.gif" border="0" alt="+"></a> </span>Memberships </div> <div name="oc_427_Memberships" id="oc_427_Memberships" class="expandblock"> <div class="detail"> <div class="indent"> <span class="section tool"><img src="/images/dictionary.gif" alt="Section Help"><span class="tip">This MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.</span></span> <div xmlns:saxon="http://saxon.sf.net/" xmlns:xalan="http://xml.apache.org/xalan" class="tabledetail" style="padding-top:10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" id="Detail"> <tr> <th valign="top" width="110px">Nature</th> <th valign="top" width="40px">Type</th> <th valign="top" width="50px">ID</th> <th valign="top">Name</th> </tr> <tbody> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">991</td> <td valign="top"> <a href="/data/definitions/991.html" target="_blank" rel="noopener noreferrer">SFP Secondary Cluster: Tainted Input to Environment</a> </td> </tr> <tr class="primary Category"> <td valign="top">MemberOf</td> <td valign="top" nowrap class="right" align="center" style="padding-top:1px"><span class="tool"><img src="/images/icons/category.gif" alt="Category" class="icon"><span class="tip">Category - a CWE entry that contains a set of other entries that share a common characteristic.</span></span></td> <td valign="top">1403</td> <td valign="top"> <a href="/data/definitions/1403.html" target="_blank" rel="noopener noreferrer">Comprehensive Categorization: Exposed Resource</a> </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div id="Vulnerability_Mapping_Notes"> <div class="heading" id="Vulnerability_Mapping_Notes_427"><span><a href="javascript:toggleblocksOC('427_Vulnerability_Mapping_Notes');"><img id="ocimg_427_Vulnerability_Mapping_Notes" src="/images/head_more.gif" border="0" alt="+"></a> </span>Vulnerability Mapping Notes</div> <div name="oc_427_Vulnerability_Mapping_Notes" id="oc_427_Vulnerability_Mapping_Notes" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <td> <p class="subheading" style="display:inline-block;"> Usage: <span style="color:#4E8F4A"> ALLOWED </span> </p> <div style="font-size:90%; font-style:italic; padding:5px;display:inline-block;"> (this CWE ID may be used to map to real-world vulnerabilities) </div> </td> </tr> <tr> <td valign="top" width="100%"> <p> <span class="suboptheading">Reason: </span> Acceptable-Use </p> </td> </tr> <tr> <td> <p class="suboptheading"> Rationale: </p> This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities. </td> </tr> <tr> <td> <p class="suboptheading"> Comments: </p>Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to &#39;force&#39; a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction. </td> </tr> </table> </div> </div> </div> </div> </div> <div id="Notes"> <div class="heading" id="Notes_427"><span><a href="javascript:toggleblocksOC('427_Notes');"><img id="ocimg_427_Notes" src="/images/head_more.gif" border="0" alt="+"></a> </span>Notes</div> <div name="oc_427_Notes" id="oc_427_Notes" class="expandblock"> <div class="detail"> <div class="indent"> <div class="Relationship_Note"> <p class="subheading">Relationship</p> <div class="indent"> Unlike untrusted search path (<a href="/data/definitions/426.html">CWE-426</a>), which inherently involves control over the definition of a control sphere (i.e., modification of a search path), this entry concerns a fixed control sphere in which some part of the sphere may be under attacker control (i.e., the search path cannot be modified by an attacker, but one element of the path can be under attacker control). </div> </div> <div class="Theoretical_Note"> <p class="subheading">Theoretical</p> <div class="indent"> This weakness is not a clean fit under <a href="/data/definitions/668.html">CWE-668</a> or <a href="/data/definitions/610.html">CWE-610</a>, which suggests that the control sphere model might need enhancement or clarification. </div> </div> </div> </div> </div> </div> <div id="Taxonomy_Mappings"> <div class="heading" id="Taxonomy_Mappings_427"><span><a href="javascript:toggleblocksOC('427_Taxonomy_Mappings');"><img id="ocimg_427_Taxonomy_Mappings" src="/images/head_more.gif" border="0" alt="+"></a> </span>Taxonomy Mappings</div> <div name="oc_427_Taxonomy_Mappings" id="oc_427_Taxonomy_Mappings" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <th valign="top" nowrap width="230px">Mapped Taxonomy Name</th> <th valign="top" nowrap width="100px">Node ID</th> <th valign="top" nowrap>Fit</th> <th valign="top">Mapped Node Name</th> </tr> <tr> <td valign="top">PLOVER</td> <td valign="top"></td> <td valign="top"></td> <td valign="top">Uncontrolled Search Path Element</td> </tr> </table> </div> </div> </div> </div> </div> <div id="Related_Attack_Patterns"> <div class="heading" id="Related_Attack_Patterns_427"><span><a href="javascript:toggleblocksOC('427_Related_Attack_Patterns');"><img id="ocimg_427_Related_Attack_Patterns" src="/images/head_more.gif" border="0" alt="+"></a> </span>Related Attack Patterns</div> <div name="oc_427_Related_Attack_Patterns" id="oc_427_Related_Attack_Patterns" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <th valign="top" nowrap width="110px">CAPEC-ID</th> <th valign="top">Attack Pattern Name</th> </tr> <tr> <td valign="top"><a href="http://capec.mitre.org/data/definitions/38.html" target="_blank" rel="noopener noreferrer">CAPEC-38</a></td> <td valign="top">Leveraging/Manipulating Configuration File Search Paths</td> </tr> <tr> <td valign="top"><a href="http://capec.mitre.org/data/definitions/471.html" target="_blank" rel="noopener noreferrer">CAPEC-471</a></td> <td valign="top">Search Order Hijacking</td> </tr> </table> </div> </div> </div> </div> </div> <div id="References"> <div class="heading" id="References_427"><span><a href="javascript:toggleblocksOC('427_References');"><img id="ocimg_427_References" src="/images/head_more.gif" border="0" alt="+"></a> </span>References</div> <div name="oc_427_References" id="oc_427_References" class="expandblock"> <div class="detail"> <div class="indent"> <div id="Grouped"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <tr> <td valign="top"> <div id="REF-409_427">[REF-409] Georgi Guninski. &#34;Double clicking on MS Office documents from Windows Explorer may execute arbitrary programs in some cases&#34;. Bugtraq. 2000-09-18. &lt;<a href="https://seclists.org/bugtraq/2000/Sep/331" target="_blank" rel="noopener noreferrer">https://seclists.org/bugtraq/2000/Sep/331</a>&gt;. <i>URL validated: 2023-01-30</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-410_427">[REF-410] Mitja Kolsek. &#34;ACROS Security: Remote Binary Planting in Apple iTunes for Windows (ASPR #2010-08-18-1)&#34;. Bugtraq. 2010-08-18. &lt;<a href="https://lists.openwall.net/bugtraq/2010/08/18/4" target="_blank" rel="noopener noreferrer">https://lists.openwall.net/bugtraq/2010/08/18/4</a>&gt;. <i>URL validated: 2023-01-30</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-411_427">[REF-411] Taeho Kwon and Zhendong Su. &#34;Automatic Detection of Vulnerable Dynamic Component Loadings&#34;. &lt;<a href="https://dl.acm.org/doi/10.1145/1831708.1831722" target="_blank" rel="noopener noreferrer">https://dl.acm.org/doi/10.1145/1831708.1831722</a>&gt;. <i>URL validated: 2023-04-07</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-412_427">[REF-412] &#34;Dynamic-Link Library Search Order&#34;. Microsoft. 2010-09-02. &lt;<a href="https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order?redirectedfrom=MSDN" target="_blank" rel="noopener noreferrer">https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order?redirectedfrom=MSDN</a>&gt;. <i>URL validated: 2023-04-07</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-413_427">[REF-413] &#34;Dynamic-Link Library Security&#34;. Microsoft. 2010-09-02. &lt;<a href="https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-security" target="_blank" rel="noopener noreferrer">https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-security</a>&gt;. <i>URL validated: 2023-04-07</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-414_427">[REF-414] &#34;An update on the DLL-preloading remote attack vector&#34;. Microsoft. 2010-08-31. &lt;<a href="https://msrc.microsoft.com/blog/2010/08/an-update-on-the-dll-preloading-remote-attack-vector/" target="_blank" rel="noopener noreferrer">https://msrc.microsoft.com/blog/2010/08/an-update-on-the-dll-preloading-remote-attack-vector/</a>&gt;. <i>URL validated: 2023-04-07</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-415_427">[REF-415] &#34;Insecure Library Loading Could Allow Remote Code Execution&#34;. Microsoft. 2010-08-23. &lt;<a href="https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/2269637#insecure-library-loading-could-allow-remote-code-execution" target="_blank" rel="noopener noreferrer">https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/2269637#insecure-library-loading-could-allow-remote-code-execution</a>&gt;. <i>URL validated: 2023-04-07</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-416_427">[REF-416] HD Moore. &#34;Application DLL Load Hijacking&#34;. 2010-08-23. &lt;<a href="https://www.rapid7.com/blog/?p=5325" target="_blank" rel="noopener noreferrer">https://www.rapid7.com/blog/?p=5325</a>&gt;. <i>URL validated: 2023-04-07</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-417_427">[REF-417] Oliver Lavery. &#34;DLL Hijacking: Facts and Fiction&#34;. 2010-08-26. &lt;<a href="https://threatpost.com/dll-hijacking-facts-and-fiction-082610/74384/" target="_blank" rel="noopener noreferrer">https://threatpost.com/dll-hijacking-facts-and-fiction-082610/74384/</a>&gt;. <i>URL validated: 2023-04-07</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-1168_427">[REF-1168] Catalin Cimpanu. &#34;Microsoft warns enterprises of new &#39;dependency confusion&#39; attack technique&#34;. ZDNet. 2021-02-10. &lt;<a href="https://www.zdnet.com/article/microsoft-warns-enterprises-of-new-dependency-confusion-attack-technique/" target="_blank" rel="noopener noreferrer">https://www.zdnet.com/article/microsoft-warns-enterprises-of-new-dependency-confusion-attack-technique/</a>&gt;. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-1169_427">[REF-1169] Alex Birsan. &#34;Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies&#34;. 2021-02-09. &lt;<a href="https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610" target="_blank" rel="noopener noreferrer">https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610</a>&gt;. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-1170_427">[REF-1170] Microsoft. &#34;3 Ways to Mitigate Risk When Using Private Package Feeds&#34;. 2021-02-09. &lt;<a href="https://azure.microsoft.com/mediahandler/files/resourcefiles/3-ways-to-mitigate-risk-using-private-package-feeds/3%20Ways%20to%20Mitigate%20Risk%20When%20Using%20Private%20Package%20Feeds%20-%20v1.0.pdf" target="_blank" rel="noopener noreferrer">https://azure.microsoft.com/mediahandler/files/resourcefiles/3-ways-to-mitigate-risk-using-private-package-feeds/3%20Ways%20to%20Mitigate%20Risk%20When%20Using%20Private%20Package%20Feeds%20-%20v1.0.pdf</a>&gt;. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-1325_427">[REF-1325] &#34;exec package - os/exec - Go Packages&#34;. 2023-04-04. &lt;<a href="https://pkg.go.dev/os/exec" target="_blank" rel="noopener noreferrer">https://pkg.go.dev/os/exec</a>&gt;. <i>URL validated: 2023-04-21</i>. </div> </td> </tr> <tr> <td valign="top"> <div id="REF-1326_427">[REF-1326] Brian M. Carlson. &#34;Git LFS Changelog&#34;. 2022-04-19. &lt;<a href="https://github.com/git-lfs/git-lfs/commit/032dca8ee69c193208cd050024c27e82e11aef81" target="_blank" rel="noopener noreferrer">https://github.com/git-lfs/git-lfs/commit/032dca8ee69c193208cd050024c27e82e11aef81</a>&gt;. <i>URL validated: 2023-04-21</i>. </div> </td> </tr> </table> </div> </div> </div> </div> </div> <div id="Content_History"> <div class="heading" id="Content_History_427"><span><a href="javascript:toggleblocksOC('427_Content_History');"><img id="ocimg_427_Content_History" src="/images/head_more.gif" border="0" alt="+"></a> </span>Content History</div> <div name="oc_427_Content_History" id="oc_427_Content_History" class="expandblock"> <div class="tabledetail"> <div class="indent"> <div style="margin-top: 10px"> <table width="98%" cellpadding="0" cellspacing="0" border="0" class="Detail"> <thead class="Submissions"> <tr> <th valign="top" colspan="3" class="title"><span><a href="javascript:toggleblocksOC('427_Submissions');"><img id="ocimg_427_Submissions" src="/images/head_more.gif" border="0" alt="+"></a> </span>Submissions</th> </tr> </thead> <tbody id="oc_427_Submissions" class="expandblock"> <tr> <th valign="top" style="width:200px;">Submission Date</th> <th valign="top" nowrap>Submitter</th> <th valign="top" nowrap>Organization</th> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2006-07-19 <br><span class="smaller" style="font-style:italic">(CWE Draft 3, 2006-07-19)</span> </td> <td valign="top">PLOVER</td> <td valign="top"></td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> </td> </tr> </tbody> <thead class="Contributions"> <tr> <th valign="top" colspan="3" class="title"><span><a href="javascript:toggleblocksOC('427_Contributions');"><img id="ocimg_427_Contributions" src="/images/head_more.gif" border="0" alt="+"></a> </span>Contributions</th> </tr> </thead> <tbody id="oc_427_Contributions" class="expandblock"> <tr> <th valign="top">Contribution Date</th> <th valign="top" nowrap>Contributor</th> <th valign="top" nowrap>Organization</th> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2022-05-24 </td> <td valign="top">Anonymous External Contributor</td> <td valign="top"></td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> provided observed examples and descriptions for Windows drive root </td> </tr> </tbody> <thead class="Modifications"> <tr> <th valign="top" colspan="3" class="title"><span><a href="javascript:toggleblocksOC('427_Modifications');"><img id="ocimg_427_Modifications" src="/images/head_less.gif" border="0" alt="+"></a> </span>Modifications</th> </tr> </thead> <tbody id="oc_427_Modifications" class="collapseblock"> <tr> <th valign="top">Modification Date</th> <th valign="top" nowrap>Modifier</th> <th valign="top" nowrap>Organization</th> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2008-07-01 </td> <td valign="top">Eric Dalci</td> <td valign="top">Cigital</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Potential_Mitigations, Time_of_Introduction </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2008-09-08 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Relationships, Observed_Example, Other_Notes, Taxonomy_Mappings </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2009-07-27 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Description, Maintenance_Notes, Observed_Examples, Other_Notes, Potential_Mitigations, Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2010-09-27 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Alternate_Terms, Applicable_Platforms, Description, Maintenance_Notes, Observed_Examples, References, Relationship_Notes, Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2011-03-29 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Potential_Mitigations </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2011-06-01 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Common_Consequences </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2012-05-11 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Observed_Examples, Related_Attack_Patterns, Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2014-02-18 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Demonstrative_Examples, Observed_Examples, Potential_Mitigations </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2014-07-30 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2015-12-07 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2019-01-03 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Related_Attack_Patterns </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2019-06-20 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Related_Attack_Patterns, Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2020-02-24 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2020-06-25 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Potential_Mitigations </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2021-03-15 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Alternate_Terms, Description, Maintenance_Notes, References, Theoretical_Notes </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2022-04-28 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Demonstrative_Examples </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2022-10-13 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Observed_Examples </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2023-01-31 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Description, Observed_Examples, References </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2023-04-27 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Demonstrative_Examples, Detection_Factors, References, Relationships </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2023-06-29 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Mapping_Notes </td> </tr> <tr> <td valign="top" nowrap rowspan="2" style="border-bottom:1px solid #BAC5E3"> 2023-10-26 </td> <td valign="top">CWE Content Team</td> <td valign="top">MITRE</td> </tr> <tr> <td valign="top" colspan="2" style="border-bottom:1px solid #BAC5E3; font-size:90%; background-color:#eeeeee"> updated Observed_Examples </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> <!-- End main content --> <div id="More_Message_Custom" style="display:none;"> <div style="padding:15px 0px 0px 0px;color:#ff0000;font-size:95%;font-weight:bold;text-align:center;" >More information is available &mdash; Please edit the custom filter or select a different filter.</div></div> </td> <!-- end content pane --> </tr> </table> <div id="FootPane" class="noprint"> <div id="footbar"> <b>Page Last Updated: </b> November 19, 2024 </div> <div class="Footer noprint"> <a name="footer" id="footer"></a> <table width="100%" cellpadding="0" cellspacing="0" border="0" class="ltgreybackground" style="clear:both"> <tr> <td colspan="3" id="line"><div class="line">&nbsp;</div></td> </tr> <tr> <td valign="middle" nowrap="nowrap"> <div id="footerlinks" class="footlogo"> <a href="http://www.mitre.org" target="_blank" rel="noopener noreferrer"><img src="/images/mitre_logo.gif" height="36" border="0" alt="MITRE" title="MITRE"/></a> </div> </td> <td width="100%" valign="top" style="padding:6px 0px;"> <div id="footerlinks"> <a href="/sitemap.html">Site Map</a> | <a href="/about/termsofuse.html">Terms of Use</a> | <a href="#" onclick="Osano.cm.showDrawer('osano-cm-dom-info-dialog-open')">Manage Cookies</a> | <a href="/about/cookie_notice.html">Cookie Notice</a> | <a href="/about/privacy_policy.html">Privacy Policy</a> | <a href="mailto:cwe@mitre.org">Contact Us</a> | <a target="_blank" href="https://twitter.com/CweCapec"><img src="/images/x-logo-black.png" width="18" height="18" style="border:0;vertical-align:right;" alt="CWE X-Twitter" title="CWE X-Twitter"></a> <a target="_blank" href="https://mastodon.social/@CWE_Program"><img src="/images/mastodon-logo.png" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE Mastodon" title="CWE Mastodon"></a> <a target="_blank" href="https://www.linkedin.com/showcase/cve-cwe-capec"><img src="/images/linkedin_sm.jpg" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE on LinkedIn" title="CWE on LinkedIn"></a> <a target="_blank" href="https://www.youtube.com/channel/UCpY9VIpRmFK4ebD6orssifA"><img src="/images/youtube.png" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE YouTube channel" title="CWE YouTube Channel"></a> <a href="/news/podcast.html"><img src="/images/out_of_bounds_read_logo.png" width="22" height="22" style="border:0;vertical-align:right;" alt="CWE Out-of-Bounds-Read Podcast" title="CWE Out-of-Bounds-Read Podcast"></a> <a target="_blank" href="https://medium.com/@CWE_CAPEC"><img src="/images/medium.png" width="20" height="20" style="border:0;vertical-align:right;" alt="CWE Blog on Medium blog" title="CWE Blog on Medium"></a> </div> <p>Use of the Common Weakness Enumeration (CWE&trade;) and the associated references from this website are subject to the <a href="/about/termsofuse.html">Terms of Use</a>. CWE is sponsored by the <a target="_blank" rel="noopener noreferrer" href="https://www.dhs.gov/">U.S. Department of Homeland Security</a> (DHS) <a target="_blank" rel="noopener noreferrer" href="https://www.dhs.gov/cisa/cybersecurity-division">Cybersecurity and Infrastructure Security Agency</a> (CISA) and managed by the <a href="https://www.dhs.gov/science-and-technology/hssedi" target="_blank" rel="noopener noreferrer">Homeland Security Systems Engineering and Development Institute</a> (HSSEDI) which is operated by <a target="_blank" rel="noopener noreferrer" href="http://www.mitre.org/">The MITRE Corporation</a> (MITRE). Copyright &copy; 2006&ndash;2024, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation.</p> </td> <td valign="middle" nowrap="nowrap"> <div id="footerlinks" class="footlogo"> <a href="https://www.dhs.gov/science-and-technology/hssedi" target="_blank" rel="noopener noreferrer"><img src="/images/hssedi.png" height="36" border="0" alt="HSSEDI" title="HSSEDI"/></a> </div> </td> </tr> </table> </div> </div> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-TCLW30GNGV"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-TCLW30GNGV'); </script> </body> </html> </html>

Pages: 1 2 3 4 5 6 7 8 9 10