logo

CWE-268 - Privilege Chaining

  • Abstraction:Base
  • Structure:Simple
  • Status:Draft
  • Release Date:2006-07-19
  • Latest Modification Date:2023-06-29

Weakness Name

Privilege Chaining

Description

Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.

Common Consequences

Scope: Access Control

Impact: Gain Privileges or Assume Identity

Notes: A user can be given or gain access rights of another user. This can give the user unauthorized access to sensitive information including the access information of another user.

Related Weaknesses