logo

CWE-732 - Incorrect Permission Assignment for Critical Resource

CWE-732 High

  • Abstraction:
  • Class
  • Structure:
  • Simple
  • Status:
  • Draft
Weakness Name

Incorrect Permission Assignment for Critical Resource

Description

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.

When a resource is given a permission setting that provides access to a wider range of actors than required, it could lead to the exposure of sensitive information, or the modification of that resource by unintended parties. This is especially dangerous when the resource is related to program configuration, execution, or sensitive user data. For example, consider a misconfigured storage account for the cloud that can be read or written by a public or anonymous user.

Common Consequences

Scope: Confidentiality

Impact: Read Application Data, Read Files or Directories

Notes: An attacker may be able to read sensitive information from the associated resource, such as credentials or configuration information stored in a file.

Scope: Access Control

Impact: Gain Privileges or Assume Identity

Notes: An attacker may be able to modify critical properties of the associated resource to gain privileges, such as replacing a world-writable executable with a Trojan horse.

Scope: Integrity, Other

Impact: Modify Application Data, Other

Notes: An attacker may be able to destroy or corrupt critical data in the associated resource, such as deletion of records from a database.

Related Weaknesses
  • Release Date:
  • 2008-09-09
  • Latest Modification Date:
  • 2023-06-29