CWE-268 - Privilege Chaining
- Abstraction:Base
- Structure:Simple
- Status:Draft
- Release Date:2006-07-19
- Latest Modification Date:2023-06-29
Weakness Name
Privilege Chaining
Description
Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.
Common Consequences
Scope: Access Control
Impact: Gain Privileges or Assume Identity
Notes: A user can be given or gain access rights of another user. This can give the user unauthorized access to sensitive information including the access information of another user.