Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-530 (将备份文件暴露给非授权控制范围) — Vulnerability Class 10

10 vulnerabilities classified as CWE-530 (将备份文件暴露给非授权控制范围). AI Chinese analysis included.

CWE-530 represents a critical information exposure weakness where sensitive backup files are inadvertently stored in directories accessible to unauthorized actors. Attackers typically exploit this vulnerability by probing web servers for common backup extensions, such as .bak, .old, or .~bk, to retrieve outdated source code or configuration data. These files often contain hardcoded credentials, database connection strings, or proprietary logic that was previously discarded but remains accessible in the webroot. To mitigate this risk, developers must implement strict access controls and ensure that backup files are stored outside the public document root. Additionally, automated deployment pipelines should be configured to automatically purge or securely archive backup files after successful updates, preventing them from lingering in accessible locations where they can be harvested by malicious actors seeking initial footholds.

MITRE CWE Description
A backup file is stored in a directory or archive that is made accessible to unauthorized actors. Often, older backup files are renamed with an extension such as .~bk to distinguish them from production files. The source code for old files that have been renamed in this manner and left in the webroot can often be retrieved. This renaming may have been performed automatically by the web server, or manually by the administrator.
Common Consequences (1)
ConfidentialityRead Application Data
At a minimum, an attacker who retrieves this file would have all the information contained in it, whether that be database calls, the format of parameters accepted by the application, or simply information regarding the architectural structure of your site.
Mitigations (1)
PolicyRecommendations include implementing a security policy within your organization that prohibits backing up web application source code in the webroot.

Vulnerabilities classified as CWE-530 (将备份文件暴露给非授权控制范围) represent 10 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.