logo

CWE-268 - Privilege Chaining

CWE-268 High

  • Abstraction:
  • Base
  • Structure:
  • Simple
  • Status:
  • Draft
Weakness Name

Privilege Chaining

Description

Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.

Common Consequences

Scope: Access Control

Impact: Gain Privileges or Assume Identity

Notes: A user can be given or gain access rights of another user. This can give the user unauthorized access to sensitive information including the access information of another user.

Related Weaknesses
  • Release Date:
  • 2006-07-19
  • Latest Modification Date:
  • 2023-06-29

Free security scan for your website