Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-403 (将文件描述符暴露给不受控制的范围(文件描述符泄露)) — Vulnerability Class 4

4 vulnerabilities classified as CWE-403 (将文件描述符暴露给不受控制的范围(文件描述符泄露)). AI Chinese analysis included.

CWE-403 represents a critical resource management weakness where a parent process fails to close sensitive file descriptors before spawning a child process. This oversight allows the child process to inherit and utilize these open descriptors, potentially enabling unauthorized input or output operations that bypass intended security controls. Attackers typically exploit this vulnerability by manipulating the child process to read or write to restricted resources, such as configuration files or memory-mapped areas, which were accessible to the privileged parent but should remain isolated. To mitigate this risk, developers must explicitly close unnecessary file descriptors immediately before executing child processes. Implementing strict file descriptor inheritance policies, utilizing secure API calls that automatically close descriptors, and conducting rigorous code reviews for resource handling are essential practices to prevent unintended exposure and maintain proper isolation between process control spheres.

MITRE CWE Description
A process does not close sensitive file descriptors before invoking a child process, which allows the child to perform unauthorized I/O operations using those descriptors. When a new process is forked or executed, the child process inherits any open file descriptors. When the child process has fewer privileges than the parent process, this might introduce a vulnerability if the child process can access the file descriptor but does not have the privileges to access the associated file.
Common Consequences (1)
Confidentiality, IntegrityRead Application Data, Modify Application Data

Vulnerabilities classified as CWE-403 (将文件描述符暴露给不受控制的范围(文件描述符泄露)) represent 4 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.