CWE-403: Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
Weakness ID: 403 (Weakness Base)
A process does not close sensitive file descriptors before invoking a child process, which allows the child to perform unauthorized I/O operations using those descriptors.
When a new process is forked or executed, the child process inherits any open file descriptors. When the child process has fewer privileges than the parent process, this might introduce a vulnerability if the child process can access the file descriptor but does not have the privileges to access the associated file.
File descriptor leak:
While this issue is frequently called a file descriptor leak, the
"leak" term is often used in two different ways - exposure of a
resource, or consumption of a resource. Use of this term could cause
Time of Introduction
Architecture and Design
Technical Impact: Read application data; Modify application data