Statements (18)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
| gptkbp:category |
Security weakness
|
| gptkbp:citation |
https://cwe.mitre.org/data/definitions/288.html
|
| gptkbp:consequence |
Unauthorized access
Privilege escalation |
| gptkbp:describes |
A situation where authentication is bypassed by using an alternate path or channel
|
| gptkbp:foundIn |
Network protocols
Web applications |
| gptkbp:mitigatedBy |
Enforce authentication on all access paths
Validate all channels for authentication |
| gptkbp:name |
Authentication Bypass Using an Alternate Path or Channel
|
| gptkbp:partOf |
gptkb:CWE
|
| gptkbp:relatedTo |
Authorization
Authentication |
| gptkbp:vulnerableTo |
288
|
| gptkbp:bfsParent |
gptkb:CVE-2022-1040
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
CWE-288
|