CWE-747

GPTKB entity

Statements (13)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 5
gptkbp:bfsParent gptkb:CWE-20
gptkbp:category Improper Access Control
gptkbp:difficulty gptkb:High
gptkbp:example Using a relative path to access a configuration file.
https://www.w3.org/2000/01/rdf-schema#label CWE-747
gptkbp:impact Unauthorized access to sensitive files
gptkbp:is_described_as The software accesses a resource using a path that is incomplete or not fully specified.
gptkbp:is_effective_against Use absolute paths for resource access.
gptkbp:name Access of Resource Using Incomplete Path
gptkbp:related_to Path Traversal
File Inclusion Vulnerability