CWE-1386 - Insecure Operation on Windows Junction / Mount Point
CWE-1386
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Insecure Operation on Windows Junction / Mount Point
- Description
The product opens a file or directory, but it does not properly prevent the name from being associated with a junction or mount point to a destination that is outside of the intended control sphere.
Depending on the intended action being performed, this could allow an attacker to cause the product to read, write, delete, or otherwise operate on unauthorized files. In Windows, NTFS5 allows for file system objects called reparse points. Applications can create a hard link from one directory to another directory, called a junction point. They can also create a mapping from a directory to a drive letter, called a mount point. If a file is used by a privileged program, but it can be replaced with a hard link to a sensitive file (e.g., AUTOEXEC.BAT), an attacker could excalate privileges. When the process opens the file, the attacker can assume the privileges of that process, tricking the privileged process to read, modify, or delete the sensitive file, preventing the program from accurately processing data. Note that one can also point to registries and semaphores.
- Common Consequences
Scope: Confidentiality
Impact: Read Files or Directories
Notes: Read arbitrary files by replacing a user-controlled folder with a mount point and additional hard links.
Scope: Integrity
Impact: Modify Files or Directories
Notes: Modify an arbitrary file by replacing the rollback files in installer directories, as they can have the installer execute those rollbacks.
Scope: Availability
Impact: Modify Files or Directories
Notes: Even if there is no control of contents, an arbitrary file delete or overwrite (when running as SYSTEM or admin) can be used for a permanent system denial-of-service, e.g. by deleting a startup configuration file that prevents the service from starting.
- Related Weaknesses
- Release Date:
- 2022-06-28
- Latest Modification Date:
- 2023-06-29
Free security scan for your website