Statements (19)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
gptkbp:category |
Authorization
|
gptkbp:citation |
https://cwe.mitre.org/data/definitions/862.html
|
gptkbp:consequence |
Unauthorized access
Privilege escalation |
gptkbp:describes |
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
|
gptkbp:foundIn |
APIs
Web applications Mobile applications |
gptkbp:hasCWE |
862
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-862
|
gptkbp:mitigatedBy |
Use role-based access control
Implement proper authorization checks |
gptkbp:name |
Missing Authorization
|
gptkbp:partOf |
gptkb:CWE_Top_25_Most_Dangerous_Software_Weaknesses
|
gptkbp:relatedTo |
gptkb:CWE-863
CWE-285 |
gptkbp:bfsParent |
gptkb:Broken_Access_Control
|
gptkbp:bfsLayer |
6
|