8. of Information Disclosure II
An attacker can address information through a search indexer, logger, or other such mechanism.
Threat |
|
Your local machine has been a bit too zealous in indexing the files on your disk, and the index is available to other users of the machine. |
|
CAPEC |
CAPEC-643 - Identify Shared Files/Directories on System |
ASVS |
4.1.3 - Ensure users or services only have the necessary privileges to perform the actions they need to do. |
CWE |
CWE-612 - Improper Authorization of Index Containing Sensitive Information |
Mitigations |
|
|