CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs

ID CAPEC-1
Typical Severity High
Likelihood Of Attack High
Status Draft

In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be available only to users at a higher privilege level, can access management sections of the application, or can run queries for data that they otherwise not supposed to.

https://capec.mitre.org/data/definitions/1.html

Weaknesses

# ID Name Type
CWE-276 Incorrect Default Permissions weakness
CWE-285 Improper Authorization weakness
CWE-434 Unrestricted Upload of File with Dangerous Type weakness
CWE-693 Protection Mechanism Failure weakness
CWE-732 Incorrect Permission Assignment for Critical Resource weakness
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control weakness
CWE-1193 Power-On of Untrusted Execution Core Before Enabling Fabric Access Control weakness
CWE-1220 Insufficient Granularity of Access Control weakness
CWE-1297 Unprotected Confidential Information on Device is Accessible by OSAT Vendors weakness
CWE-1311 Improper Translation of Security Attributes by Fabric Bridge weakness
CWE-1314 Missing Write Protection for Parametric Data Values weakness
CWE-1315 Improper Setting of Bus Controlling Capability in Fabric End-point weakness
CWE-1318 Missing Support for Security Features in On-chip Fabrics or Buses weakness
CWE-1320 Improper Protection for Outbound Error Messages and Alert Signals weakness
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') weakness
CWE-1327 Binding to an Unrestricted IP Address weakness

Taxonomiy Mapping

Loading...