Statements (13)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:CWE-20
|
gptkbp:category |
Improper Access Control
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
Using a relative path to access a configuration file.
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-747
|
gptkbp:impact |
Unauthorized access to sensitive files
|
gptkbp:is_described_as |
The software accesses a resource using a path that is incomplete or not fully specified.
|
gptkbp:is_effective_against |
Use absolute paths for resource access.
|
gptkbp:name |
Access of Resource Using Incomplete Path
|
gptkbp:related_to |
Path Traversal
File Inclusion Vulnerability |