This vulnerability occurs when a system grants overly permissive access to a sensitive resource, allowing unauthorized users or processes to read or alter it.
This flaw happens when security settings for a critical file, directory, or cloud resource are configured too loosely. Instead of restricting access to only the necessary users or services, the permissions are set to allow a much broader range of actors. This creates an open door for data exposure or unauthorized changes. In practice, this often involves misconfigured file system permissions, database access controls, or cloud storage settings. For instance, a cloud storage container set to 'public read' could leak sensitive data, or a configuration file writable by any system user could be tampered with to alter the program's behavior. The core risk is that the intended security boundary around the resource is incorrectly defined and enforced.
Impact: Read Application DataRead Files or Directories
An attacker may be able to read sensitive information from the associated resource, such as credentials or configuration information stored in a file.
Impact: Gain Privileges or Assume Identity
An attacker may be able to modify critical properties of the associated resource to gain privileges, such as replacing a world-writable executable with a Trojan horse.
Impact: Modify Application DataOther
An attacker may be able to destroy or corrupt critical data in the associated resource, such as deletion of records from a database.
Effectiveness: Moderate
Strategy: Sandbox or Jail
Effectiveness: Limited
Effectiveness: High
Effectiveness: High
Strategy: Environment Hardening
c
/* Ignore link following (CWE-59) for brevity /
c
bashphpperlbashbashgoshellshellshellshell{
jsongsutil iam ch -d allUsers gs://BUCKET_NAME gsutil iam ch -d allAuthenticatedUsers gs://BUCKET_NAME
High