Files or Directories Accessible to External Parties
Weakness ID: 552 (Weakness Base)Status: Draft
+ Description

Description Summary

Files or directories are accessible in the environment that should not be.
+ Time of Introduction
  • Implementation
  • Operation
+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ChildOfCategoryCategory2Environment
Development Concepts (primary)699
ChildOfCategoryCategory632Weaknesses that Affect Files or Directories
Resource-specific Weaknesses (primary)631
ChildOfWeakness ClassWeakness Class668Exposure of Resource to Wrong Sphere
Research Concepts (primary)1000
ChildOfCategoryCategory731OWASP Top Ten 2004 Category A10 - Insecure Configuration Management
Weaknesses in OWASP Top Ten (2004) (primary)711
ChildOfCategoryCategory743CERT C Secure Coding Section 09 - Input Output (FIO)
Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734
ParentOfWeakness VariantWeakness Variant527Exposure of CVS Repository to an Unauthorized Control Sphere
Development Concepts699
Research Concepts1000
ParentOfWeakness VariantWeakness Variant528Exposure of Core Dump File to an Unauthorized Control Sphere
Development Concepts699
Research Concepts1000
ParentOfWeakness VariantWeakness Variant529Exposure of Access Control List Files to an Unauthorized Control Sphere
Development Concepts699
Research Concepts1000
ParentOfWeakness VariantWeakness Variant530Exposure of Backup File to an Unauthorized Control Sphere
Research Concepts1000
ParentOfWeakness VariantWeakness Variant532Information Leak Through Log Files
Development Concepts699
Research Concepts1000
ParentOfWeakness VariantWeakness Variant533Information Leak Through Server Log Files
Development Concepts699
ParentOfWeakness VariantWeakness Variant534Information Leak Through Debug Log Files
Development Concepts699
ParentOfWeakness VariantWeakness Variant540Information Leak Through Source Code
Development Concepts699
Research Concepts1000
ParentOfWeakness VariantWeakness Variant542Information Leak Through Cleanup Log Files
Development Concepts699
ParentOfWeakness VariantWeakness Variant548Information Leak Through Directory Listing
Research Concepts1000
ParentOfWeakness VariantWeakness Variant553Command Shell in Externally Accessible Directory
Development Concepts (primary)699
Research Concepts (primary)1000
+ Affected Resources
  • File/Directory
+ Taxonomy Mappings
Mapped Taxonomy NameNode IDFitMapped Node Name
OWASP Top Ten 2004A10CWE More SpecificInsecure Configuration Management
CERT C Secure CodingFIO15-CEnsure that file operations are performed in a secure directory
+ Content History
Modifications
Modification DateModifierOrganizationSource
2008-07-01Eric DalciCigitalExternal
updated Time of Introduction
2008-08-15VeracodeExternal
Suggested OWASP Top Ten 2004 mapping
2008-09-08CWE Content TeamMITREInternal
updated Relationships, Taxonomy Mappings
2008-11-24CWE Content TeamMITREInternal
updated Relationships, Taxonomy Mappings
2009-07-27CWE Content TeamMITREInternal
updated Relationships
Previous Entry Names
Change DatePrevious Entry Name
2008-04-11Errant Files or Directories Accessible