Description
The product records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.
Potential Impact
Non-Repudiation, Access Control
Hide Activities, Gain Privileges or Assume Identity
Demonstrative Examples
function readFile($filename){
$user = getCurrentUser();$realFile = $filename;
//resolve file if its a symbolic link
if(is_link($filename)){$realFile = readlink($filename);}
if(fileowner($realFile) == $user){echo file_get_contents($realFile);return;}else{echo 'Access denied';writeLog($user . ' attempted to access the file '. $filename . ' on '. date('r'));}
}Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2002-0725 | Attacker performs malicious actions on a hard link to a file, obscuring the real target file. |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Obscured Security-relevant Information by Alternate Name
Frequently Asked Questions
What is CWE-224?
CWE-224 (Obscured Security-relevant Information by Alternate Name) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.
How can CWE-224 be exploited?
Attackers can exploit CWE-224 (Obscured Security-relevant Information by Alternate Name) to hide activities, gain privileges or assume identity. This weakness is typically introduced during the Implementation, Operation phase of software development.
How do I prevent CWE-224?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-224?
CWE-224 is classified as a Base-level weakness (Medium abstraction). It has been observed in 1 real-world CVEs.