Home / Vulnerability Database / Go : File permission manipulation
Go
Go : File permission manipulation
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
HIPAA
Overview
The application changes the file access permissions. The extra permissions (e.g., the right to execute) for an unlimited number of users can facilitate the organization of the attack.
Unix-like systems use the commands MkdirAll, OpenFile, Chmod for rights management. Here, the “file” is understood in a broad sense - file, directory, socket, symbolic link, etc. For each file there are three groups of users: the file owner (user), the group to which the file owner belongs (group) and the rest (other). Each group can have the following access rights: read, write, and execute (abbreviated as r, w, and x, respectively).
LOW
DerScanner Severity Score
Do you want to fix Go : File permission manipulation in your application?
See also
Go
Go : Undocumented feature: special account
Go
Go : Nil salt
Go
