CWE-284: Improper Access Control

Pillar Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

常见后果

影响范围: Other

技术影响: Varies by Context

潜在缓解措施

阶段: Architecture and Design Operation

描述: Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.

阶段: Architecture and Design

策略: Separation of Privilege

观察示例

参考: CVE-2022-24985

A form hosting website only checks the session authentication status for a single form, making it possible to bypass authentication when there are multiple forms

参考: CVE-2022-29238

Access-control setting in web-based document collaboration tool is not properly implemented by the code, which prevents listing hidden directories but does not prevent direct requests to files in those directories.

参考: CVE-2022-23607

Python-based HTTP library did not scope cookies to a particular domain such that "supercookies" could be sent to any domain on redirect

参考: CVE-2021-21972

Chain: Cloud computing virtualization platform does not require authentication for upload of a tar format file (CWE-306), then uses .. path traversal sequences (CWE-23) in the file to access unexpected files, as exploited in the wild per CISA KEV.

参考: CVE-2021-37415

IT management product does not perform authentication for some REST API requests, as exploited in the wild per CISA KEV.

参考: CVE-2021-35033

Firmware for a WiFi router uses a hard-coded password for a BusyBox shell, allowing bypass of authentication through the UART port

参考: CVE-2020-10263

Bluetooth speaker does not require authentication for the debug functionality on the UART port, allowing root shell access

参考: CVE-2020-13927

Default setting in workflow management product allows all API requests without authentication, as exploited in the wild per CISA KEV.

参考: CVE-2010-4624

Bulletin board applies restrictions on number of images during post creation, but does not enforce this on editing.

引入模式

阶段 说明
Architecture and Design -
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Operation -

适用平台

技术
Not Technology-Specific (Undetermined) ICS/OT (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Access Control List (ACL) errors -
WASC 2 Insufficient Authorization -
7 Pernicious Kingdoms - Missing Access Control -
关键信息

CWE ID: CWE-284

抽象级别: Pillar

结构: Simple

状态: Incomplete

相关攻击模式
CAPEC-19 CAPEC-441 CAPEC-478 CAPEC-479 CAPEC-502 CAPEC-503 CAPEC-536 CAPEC-546 CAPEC-550 CAPEC-551 CAPEC-552 CAPEC-556 CAPEC-558 CAPEC-562 CAPEC-563 CAPEC-564 CAPEC-578