Statements (36)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:CWE-74
|
gptkbp:category |
Access Control Issues
|
gptkbp:consequences |
Data breaches, unauthorized data modification.
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
A file upload feature allows users to overwrite sensitive files.
A misconfigured cloud storage bucket allows public access. A web application that allows users to access files without proper permission checks. A user can access admin functions without being an admin. |
gptkbp:has_weakness |
gptkb:CWE-284
CWE-269 |
https://www.w3.org/2000/01/rdf-schema#label |
CWE-128
|
gptkbp:impact |
Unauthorized access to critical resources.
|
gptkbp:is_described_as |
The software assigns permissions to a resource in a way that allows unauthorized access.
|
gptkbp:is_protected_by |
User role management.
Regular security audits. Implement proper access control mechanisms. Least privilege principle. |
gptkbp:is_referenced_in |
gptkb:CWE-200
gptkb:CWE-22 gptkb:CWE-276 gptkb:CWE-284 gptkb:CWE-73 gptkb:SANS_Top_25 gptkb:API gptkb:ISO/_IEC_27001 NISTSP 800-53 CWE-732 CWE-269 |
gptkbp:name |
Incorrect Permission Assignment for Critical Resource
|
gptkbp:related_to |
gptkb:CWE-276
CWE-732 |
gptkbp:supports |
Web applications
Mobile applications Desktop applications |