Read Time:16 Second
Description
The software does not properly manage a user within its environment.
Users can be assigned to the wrong group (class) of permissions resulting in unintended access rights to sensitive objects.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Other: Varies by Context