CWE-610

Externally Controlled Reference to a Resource in Another Sphere

Weakness Description

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.

Common Consequences

ConfidentialityIntegrity
Read Application DataModify Application Data

An adversary could read or modify data, depending on how the resource is intended to be used.

Access Control
Gain Privileges or Assume Identity

An adversary that can supply a reference to an unintended resource can potentially access a resource that they do not have privileges for, thus bypassing existing access control mechanisms.

Advertisement

Related Weaknesses