CWE-61
UNIX Symbolic Link (Symlink) Following
AI Translation Available
The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
Status
incomplete
Abstraction
compound
Likelihood
high
Affected Platforms
Extended Description
AI Translation
A product that allows UNIX symbolic links (symlink) as part of paths whether in internal code or through user input can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read/write/corrupt a file that they originally did not have permissions to access.
Technical Details
AI Translation
Common Consequences
confidentiality
integrity
Impacts
read files or directories
modify files or directories
Detection Methods
automated static analysis
Potential Mitigations
Phases:
implementation
architecture and design
Descriptions:
•
Follow the principle of least privilege when assigning access rights to entities in a software system.
Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.
•
Symbolic link attacks often occur when a program creates a tmp directory that stores files/links. Access to the directory should be restricted to the program as to prevent attackers from manipulating the files.
Functional Areas
file processing