logo

CWE-283 - Unverified Ownership

  • Abstraction:Base
  • Structure:Simple
  • Status:Draft
  • Release Date:2006-07-19
  • Latest Modification Date:2023-06-29

Weakness Name

Unverified Ownership

Description

The product does not properly verify that a critical resource is owned by the proper entity.

Common Consequences

Scope: Access Control

Impact: Gain Privileges or Assume Identity

Notes: An attacker could gain unauthorized access to system resources.

Related Weaknesses