CWE-243
Creation of chroot Jail Without Changing Working Directory
AI Translation Available
The product uses the chroot() system call to create a jail, but does not change the working directory afterward. This does not prevent access to files outside of the jail.
Status
draft
Abstraction
variant
Likelihood
high
Affected Platforms
C
C++
Extended Description
AI Translation
Improper use of chroot() may allow attackers to escape from the chroot jail. The chroot() function call does not change the process's current working directory, so relative paths may still refer to file system resources outside of the chroot jail after chroot() has been called.
Technical Details
AI Translation
Common Consequences
confidentiality
Impacts
read files or directories
Detection Methods
automated static analysis