Variant · Low-Medium

CWE-529: Exposure of Access Control List Files to an Unauthorized Control Sphere

The product stores access control list files in a directory or other container that is accessible to actors outside of the intended control sphere.

CWE-529 · Variant Level ·1 Mitigations

Description

The product stores access control list files in a directory or other container that is accessible to actors outside of the intended control sphere.

Exposure of these access control list files may give the attacker information about the configuration of the site or system. This information may then be used to bypass the intended security policy or identify trusted systems from which an attack can be launched.

Potential Impact

Confidentiality, Access Control

Read Application Data, Bypass Protection Mechanism

Mitigations & Prevention

System Configuration

Protect access control list files.

Frequently Asked Questions

What is CWE-529?

CWE-529 (Exposure of Access Control List Files to an Unauthorized Control Sphere) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Variant-level weakness. The product stores access control list files in a directory or other container that is accessible to actors outside of the intended control sphere.

How can CWE-529 be exploited?

Attackers can exploit CWE-529 (Exposure of Access Control List Files to an Unauthorized Control Sphere) to read application data, bypass protection mechanism. This weakness is typically introduced during the Operation phase of software development.

How do I prevent CWE-529?

Key mitigations include: Protect access control list files.

What is the severity of CWE-529?

CWE-529 is classified as a Variant-level weakness (Low-Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.