CWE-732 - Incorrect Permission Assignment for Critical Resource
CWE-732 High
- Abstraction:
- Class
- Structure:
- Simple
- Status:
- Draft
- Weakness Name
Incorrect Permission Assignment for Critical Resource
- Description
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
When a resource is given a permission setting that provides access to a wider range of actors than required, it could lead to the exposure of sensitive information, or the modification of that resource by unintended parties. This is especially dangerous when the resource is related to program configuration, execution, or sensitive user data. For example, consider a misconfigured storage account for the cloud that can be read or written by a public or anonymous user.
- Common Consequences
Scope: Confidentiality
Impact: Read Application Data, Read Files or Directories
Notes: An attacker may be able to read sensitive information from the associated resource, such as credentials or configuration information stored in a file.
Scope: Access Control
Impact: Gain Privileges or Assume Identity
Notes: An attacker may be able to modify critical properties of the associated resource to gain privileges, such as replacing a world-writable executable with a Trojan horse.
Scope: Integrity, Other
Impact: Modify Application Data, Other
Notes: An attacker may be able to destroy or corrupt critical data in the associated resource, such as deletion of records from a database.
- Related Weaknesses
- Release Date:
- 2008-09-09
- Latest Modification Date:
- 2023-06-29
Free security scan for your website