CWE-552: Files or Directories Accessible to External Parties

Base Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product makes files or directories accessible to unauthorized actors, even though they should not be.

常见后果

影响范围: Confidentiality Integrity

技术影响: Read Files or Directories Modify Files or Directories

潜在缓解措施

阶段: Implementation System Configuration Operation

描述: When storing data in the cloud (e.g., S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to disable public access.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2005-1835

Data file under web root.

引入模式

阶段 说明
Architecture and Design -
Implementation OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.
Operation OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.

适用平台

编程语言
Not Language-Specific (Undetermined)
技术
Not Technology-Specific (Undetermined) Cloud Computing (Often)

分类映射

分类名称 条目ID 条目名称 映射适配度
OWASP Top Ten 2004 A10 Insecure Configuration Management CWE More Specific
CERT C Secure Coding FIO15-C Ensure that file operations are performed in a secure directory -
关键信息

CWE ID: CWE-552

抽象级别: Base

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-150 CAPEC-639