CWE-285

GPTKB entity

Statements (13)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-23
gptkbp:category Access Control Issues
gptkbp:difficulty gptkb:High
gptkbp:example A user can access another user's account without proper authentication.
https://www.w3.org/2000/01/rdf-schema#label CWE-285
gptkbp:impact Unauthorized access to sensitive data or functionality.
gptkbp:is_described_as The software does not properly restrict access to a resource or action.
gptkbp:is_protected_by Implement proper access controls.
gptkbp:is_referenced_in https://cwe.mitre.org/data/definitions/285.html
gptkbp:name Improper Authorization
gptkbp:related_to gptkb:CWE-284