Improper Authorization of Index Containing Sensitive Information

Draft Base
Structure: Simple
Description

This vulnerability occurs when a system indexes sensitive documents for search but fails to properly restrict who can query that index. Attackers can then discover and extract confidential information from the indexed content without having direct access to the original files.

Extended Description

Many applications build search indexes to help users quickly find documents. However, if the index itself isn't protected with the same authorization checks as the original documents, it becomes a backdoor. An unauthorized user can perform targeted searches and view snippets or metadata from private files, effectively bypassing the intended security controls. The risk is highest when search results include surrounding context or text fragments beyond the exact search term. This can happen when search engines are misconfigured to index directories or files that should be excluded. Even without permission to download a full document, an attacker can piece together sensitive information through repeated, clever queries against the exposed index.

Common Consequences 1
Scope: Confidentiality

Impact: Read Application Data

Observed Examples 1
CVE-2022-41918A search application's access control rules are not properly applied to indices for data streams, allowing for the viewing of sensitive information.
References 1
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Taxonomy Mapping
  • WASC
Notes
Research GapThis weakness is probably under-studied and under-reported.