The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
When a resource is given a permission setting that provides access to a wider range of actors than required, it could lead to the exposure of sensitive information, or the modification of that resource by unintended parties. This is especially dangerous when the resource is related to program configuration, execution, or sensitive user data. For example, consider a misconfigured storage account for the cloud that can be read or written by a public or anonymous user.
Impact: Read Application DataRead Files or Directories
An attacker may be able to read sensitive information from the associated resource, such as credentials or configuration information stored in a file.
Impact: Gain Privileges or Assume Identity
An attacker may be able to modify critical properties of the associated resource to gain privileges, such as replacing a world-writable executable with a Trojan horse.
Impact: Modify Application DataOther
An attacker may be able to destroy or corrupt critical data in the associated resource, such as deletion of records from a database.
Effectiveness: Moderate
Strategy: Sandbox or Jail
Effectiveness: Limited
Effectiveness: High
Effectiveness: High
Strategy: Environment Hardening
c
/* Ignore link following (CWE-59) for brevity /
c
bashphpperlbashbashgoshellshellshellshell{
jsongsutil iam ch -d allUsers gs://BUCKET_NAME gsutil iam ch -d allAuthenticatedUsers gs://BUCKET_NAME
High