9. of Information Disclosure II
An attacker can read sensitive information in a file with bad ACLs.
Or the alternative text:
An attacker can read sensitive information in a file with permissive permissions.
Threat |
|
You have an object store policy that grants access to any IAM user or service. |
|
CAPEC |
CAPEC-180 - Exploiting Incorrectly Configured Access Control Security Levels |
ASVS |
1.4.5 - Ensure usage of fine-grained access control such as attribute-based access control (ABAC). 4.1.3 - Ensure users or services only have the necessary privileges to perform the actions they need to do. |
CWE |
CWE-922 - Insecure Storage of Sensitive Information CWE-921 - Storage of Sensitive Data in a Mechanism without Access... |