CWE-128

GPTKB entity

Statements (36)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-74
gptkbp:category Access Control Issues
gptkbp:consequences Data breaches, unauthorized data modification.
gptkbp:difficulty gptkb:High
gptkbp:example A file upload feature allows users to overwrite sensitive files.
A misconfigured cloud storage bucket allows public access.
A web application that allows users to access files without proper permission checks.
A user can access admin functions without being an admin.
gptkbp:has_weakness gptkb:CWE-284
CWE-269
https://www.w3.org/2000/01/rdf-schema#label CWE-128
gptkbp:impact Unauthorized access to critical resources.
gptkbp:is_described_as The software assigns permissions to a resource in a way that allows unauthorized access.
gptkbp:is_protected_by User role management.
Regular security audits.
Implement proper access control mechanisms.
Least privilege principle.
gptkbp:is_referenced_in gptkb:CWE-200
gptkb:CWE-22
gptkb:CWE-276
gptkb:CWE-284
gptkb:CWE-73
gptkb:SANS_Top_25
gptkb:API
gptkb:ISO/_IEC_27001
NISTSP 800-53
CWE-732
CWE-269
gptkbp:name Incorrect Permission Assignment for Critical Resource
gptkbp:related_to gptkb:CWE-276
CWE-732
gptkbp:supports Web applications
Mobile applications
Desktop applications