Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-284 (访问控制不恰当) — Vulnerability Class 2086

2086 vulnerabilities classified as CWE-284 (访问控制不恰当). AI Chinese analysis included.

CWE-284 represents a critical security weakness where software fails to properly restrict access to sensitive resources, allowing unauthorized actors to interact with data or functions they should not reach. This flaw typically arises when developers neglect to implement robust authentication or authorization checks, enabling attackers to bypass security controls through direct URL manipulation, token forgery, or privilege escalation techniques. Exploitation often leads to severe consequences, including data breaches, unauthorized system modifications, or complete service disruption. To mitigate this risk, developers must enforce strict access control policies at every layer of the application architecture. This involves implementing comprehensive identity verification, applying the principle of least privilege, and rigorously validating user permissions before granting access to any protected resource, ensuring that only authenticated and authorized users can perform specific actions.

MITRE CWE Description
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. Access control involves the use of several protection mechanisms such as: Authentication (proving the identity of an actor) Authorization (ensuring that a given actor can access a resource), and Accountability (tracking of activities that were performed) When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc. There are two distinct behaviors that can introduce access control weaknesses: Specification: incorrect privileges, permissions, ownership, etc. are explicitly specified for either the user or the resource (for example, setting a password file to be world-writable, or giving administrator capabilities to a guest user). This action could be performed by the program or the administrator. Enforcement: the mechanism contains errors that prevent it from properly enforcing the specified access control requirements (e.g., allowing the user to specify their own privileges, or allowing a syntactically-incorrect ACL to produce insecure settings). This problem occurs within the program itself, in that it does not actually enforce the intended security policy that the administrator specifies.
Common Consequences (1)
OtherVaries by Context
Mitigations (2)
Architecture and Design, OperationVery carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
Architecture and DesignCompartmentalize the system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area. Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separatio…
Examples (2)
This code temporarily raises the program's privileges to allow creation of a new user folder.
def makeNewUserDir(username): if invalidUsername(username): #avoid CWE-22 and CWE-78 print('Usernames cannot contain invalid characters') return False try: raisePrivileges() os.mkdir('/home/' + username) lowerPrivileges() except OSError: print('Unable to create new user directory for user:' + username) return False return True
Bad · Python
This function runs an arbitrary SQL query on a given database, returning the result of the query.
function runEmployeeQuery($dbName, $name){ mysql_select_db($dbName,$globalDbHandle) or die("Could not open Database".$dbName); //Use a prepared statement to avoid CWE-89 $preparedStatement = $globalDbHandle->prepare('SELECT * FROM employees WHERE name = :name'); $preparedStatement->execute(array(':name' => $name)); return $preparedStatement->fetchAll(); } /.../ $employeeRecord = runEmployeeQuery('EmployeeDB',$_GET['EmployeeName']);
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2022-33924 Dell Wyse Management Suite 安全漏洞 — Wyse Management Suite 4.3 Medium2022-08-10
CVE-2021-46304 Siemens SICAM A8000 CP-8000 安全漏洞 — CP-8000 MASTER MODULE WITH I/O -25/+70°C 7.5 -2022-08-10
CVE-2022-2702 SourceCodester Company Website CMS Cookie site-settings.php access control — Company Website CMS 7.3 High2022-08-08
CVE-2022-27660 TCL LinkHub Mesh Wi-Fi 安全漏洞 — LinkHub Mesh Wifi 7.5 -2022-08-05
CVE-2022-27185 TCL LinkHub Mesh Wi-Fi 访问控制错误漏洞 — LinkHub Mesh Wifi 7.5 -2022-08-05
CVE-2022-27178 TCL LinkHub Mesh Wi-Fi 访问控制错误漏洞 — LinkHub Mesh Wifi 7.5 -2022-08-05
CVE-2022-26346 TCL LinkHub Mesh Wi-Fi 访问控制错误漏洞 — LinkHub Mesh Wifi 7.5 -2022-08-05
CVE-2021-28511 This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches t ... — EOS 5.8 Medium2022-08-05
CVE-2020-1754 Moodle 安全漏洞 — Moodle 4.3 -2022-08-05
CVE-2022-33720 SAMSUNG Mobile devices 授权问题漏洞 — Samsung Mobile Devices 2.4 Low2022-08-05
CVE-2022-36832 SAMSUNG Mobile devices 安全漏洞 — Cameralyzer 4.0 Medium2022-08-05
CVE-2022-33731 SAMSUNG Mobile devices 安全漏洞 — Samsung Mobile Devices 5.1 Medium2022-08-05
CVE-2022-33714 SAMSUNG Mobile devices 安全漏洞 — Samsung Mobile Devices 6.2 Medium2022-08-05
CVE-2022-2631 Improper Access Control in tooljet/tooljet — tooljet/tooljet 8.1 -2022-08-02
CVE-2022-26308 Improper Access Control in Configuration (Credential store) — Pandora FMS 3.7 Low2022-08-01
CVE-2022-2578 SourceCodester Garage Management System createUser.php access control — Garage Management System 6.3 Medium2022-07-29
CVE-2016-4427 Zulip 访问控制错误漏洞 — zulip 5.9 -2022-07-28
CVE-2016-4426 Zulip 安全漏洞 — zulip 6.5 -2022-07-28
CVE-2022-2225 Zero Trust Secure Web Gateway policies bypass using WARP client subcommands — WARP 8.1 High2022-07-26
CVE-2022-32212 Node.js 操作系统命令注入漏洞 — Node 8.1 -2022-07-14
CVE-2022-1025 ArgoCD 安全漏洞 — ArgoCD 8.8 -2022-07-12
CVE-2022-31257 Siemens Mendix Applications using Mendix 7和Siemens Mendix Applications using Mendix 9 安全漏洞 — Mendix Applications using Mendix 7 9.1 -2022-07-12
CVE-2022-33706 Samsung Gallery 安全漏洞 — Samsung Gallery 4.6 -2022-07-11
CVE-2022-33701 SAMSUNG Mobile devices 安全漏洞 — Samsung Mobile Devices 3.3 Low2022-07-11
CVE-2022-30752 SAMSUNG Mobile devices SemWifiApClient 安全漏洞 — Samsung Mobile Devices 3.3 Low2022-07-11
CVE-2022-30751 SAMSUNG Mobile devices SemWifiApClient 安全漏洞 — Samsung Mobile Devices 3.3 Low2022-07-11
CVE-2022-30750 SAMSUNG Mobile devices SemWifiApClient 安全漏洞 — Samsung Mobile Devices 3.3 Low2022-07-11
CVE-2022-20859 Cisco Unified Communications Products Access Control Vulnerability — Cisco Unified Communications Manager 6.5 Medium2022-07-06
CVE-2022-34894 JetBrains Hub 安全漏洞 — Hub 3.5 Low2022-07-01
CVE-2022-2088 Elcomplus SmartICS Access Control — SmartICS 6.8 Medium2022-06-27

Vulnerabilities classified as CWE-284 (访问控制不恰当) represent 2086 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.