Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-529 (将访问控制列表文件暴露给非授权控制范围) — Vulnerability Class 1

1 vulnerabilities classified as CWE-529 (将访问控制列表文件暴露给非授权控制范围). AI Chinese analysis included.

CWE-529 represents a critical access control weakness where sensitive configuration files, specifically those defining access control lists, are stored in directories accessible to unauthorized actors. This exposure allows attackers to harvest detailed insights into system architecture and security policies, potentially revealing trusted internal systems or bypassing intended restrictions. Exploitation typically involves an adversary scanning accessible directories to locate these unprotected files, thereby gaining the intelligence necessary to craft targeted attacks or elevate privileges. To mitigate this risk, developers must enforce strict file system permissions, ensuring that access control list files are readable only by authorized processes and users. Additionally, implementing robust directory traversal protections and regularly auditing file storage locations helps prevent accidental exposure, thereby maintaining the integrity of the security boundary and protecting the system from information disclosure vulnerabilities.

MITRE CWE Description
The product stores access control list files in a directory or other container that is accessible to actors outside of the intended control sphere. Exposure of these access control list files may give the attacker information about the configuration of the site or system. This information may then be used to bypass the intended security policy or identify trusted systems from which an attack can be launched.
Common Consequences (1)
Confidentiality, Access ControlRead Application Data, Bypass Protection Mechanism
Mitigations (1)
System ConfigurationProtect access control list files.

Vulnerabilities classified as CWE-529 (将访问控制列表文件暴露给非授权控制范围) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.