CWE-348

Use of Less Trusted Source

Weakness Description

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Common Consequences

Access Control
Bypass Protection MechanismGain Privileges or Assume Identity

An attacker could utilize the untrusted data source to bypass protection mechanisms and gain access to sensitive data.

Advertisement

Related Weaknesses