CWE-268 - Privilege Chaining
CWE-268 High
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Draft
- Weakness Name
Privilege Chaining
- Description
Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.
- Common Consequences
Scope: Access Control
Impact: Gain Privileges or Assume Identity
Notes: A user can be given or gain access rights of another user. This can give the user unauthorized access to sensitive information including the access information of another user.
- Related Weaknesses
- Release Date:
- 2006-07-19
- Latest Modification Date:
- 2023-06-29
Free security scan for your website