Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Programs must comply with the principle of least privilege not only by providing privileged blocks with the minimum permissions required for correct operation, but also by ensuring that privileged blocks contain only those operations that require the increased privileges. Superfluous code contained within a privileged block necessarily operates with the privileges of that block; this increases the potential attack surface exposed to an attacker. Consequently, privileged blocks must not contain superfluous code.

Noncompliant Code Example

This noncompliant code example shows a changePassword() method that attempts to open a password file using a doPrivileged block. The doPrivileged block also contains logic that operates on the file and a superfluous System.loadLibrary() call.

...

This violates the principle of least privilege because a caller who does not have the required privileges may also be able to load the specified library.

Compliant Solution

This compliant solution moves the call to System.loadLibrary() outside the doPrivileged() block.

...

Minimizing the amount of code that requires elevated privileges eases the necessary task of auditing privileged code.

Risk Assessment

Failure to follow the principle of least privilege can lead to privilege escalation.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

SEC02-J

high

probable

high

P6

L2

Automated Detection

Automated checking is not possible in the general case. Escape analysis might be used to check that privileged data is not leaked provided that privileged data is indicated by the user.

Related Guidelines

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="15f18d3de01bcb85-91fa9f54-4c98462e-81a58667-76b3c33f9422c905b19163e1"><ac:plain-text-body><![CDATA[

[ISO/IEC TR 24772:2010

http://www.aitcnet.org/isai/]

"Privilege Sandbox Issues [java:XYO]"

]]></ac:plain-text-body></ac:structured-macro>

MITRE CWE

CWE ID 272, "Least Privilege Violation"

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="beac1a9fc110034c-d2ecb392-4570438f-8fdaa688-f323a9737c3622ba77ab3019"><ac:plain-text-body><![CDATA[

[java:[API 2006

AA. Bibliography#API 06]]

Class java.security.AccessController

]]></ac:plain-text-body></ac:structured-macro>

...