Vulnerable permission assignments
Argument gives read/write/search permissions to external users
Description
This defect occurs when functions that can change resource permissions, such as
chmod
, umask
, creat
, or
open
, specify permissions that allow unintended actors to modify
or read the resource.
Risk
If you give outside users or outside groups a wider range or permissions than required, you potentially expose your sensitive information and your modifications. This defect is especially dangerous for permissions related to:
Program configurations
Program executions
Sensitive user data
Fix
Set your permissions so that the user (u
)
has more permissions than the group (g
), and so
the group has more permissions than other users (o
),
or u >= g >= o
.
Examples
Result Information
Group: Security |
Language: C | C++ |
Default: Off |
Command-Line Syntax: DANGEROUS_PERMISSIONS |
Impact: Medium |
Version History
Introduced in R2015b
See Also
Umask used with chmod-style arguments
| Find defects (-checkers)
Topics
- Interpret Bug Finder Results in Polyspace Desktop User Interface
- Interpret Bug Finder Results in Polyspace Access Web Interface (Polyspace Access)
- Address Results in Polyspace User Interface Through Bug Fixes or Justifications
- Address Results in Polyspace Access Through Bug Fixes or Justifications (Polyspace Access)