Home / Vulnerability Database / Config files : File permission manipulation
Config files

Config files : File permission manipulation

Overview

The application changes the file access permissions. The extra permissions (e.g., the right to execute) for an unlimited number of users can facilitate the organization of the attack.

Unix-like systems use the commands MkdirAll, OpenFile, Chmod for rights management. Here, the “file” is understood in a broad sense - file, directory, socket, symbolic link, etc. For each file there are three groups of users: the file owner (user), the group to which the file owner belongs (group) and the rest (other). Each group can have the following access rights: read, write, and execute (abbreviated as r, w, and x, respectively).

MEDIUM

DerScanner Severity Score

Do you want to fix Config files : File permission manipulation in your application?

See also

Config files

Config files : Text4Shell Vulnerability

Config files

Config files : Incorrect directory deletion

Config files

Config files : Code injection