Name Probe System Files
Summary An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
Prerequisites An adversary has access to the file system of a system.
Solutions Verify that files have proper access controls set, and reduce the storage of sensitive information to only what is necessary.
Related Weaknesses
CWE ID Description
CWE-552 Files or Directories Accessible to External Parties
Back to Top