Tag Archives: CWE- 530

CWE-530 – Exposure of Backup File to an Unauthorized Control Sphere

Read Time:47 Second

Description

A backup file is stored in a directory or archive that is made accessible to unauthorized actors.

Often, older backup files are renamed with an extension such as .~bk to distinguish them from production files. The source code for old files that have been renamed in this manner and left in the webroot can often be retrieved. This renaming may have been performed automatically by the web server, or manually by the administrator.

Modes of Introduction:

– Operation

 

 

Related Weaknesses

CWE-552

 

Consequences

Confidentiality: Read Application Data

At a minimum, an attacker who retrieves this file would have all the information contained in it, whether that be database calls, the format of parameters accepted by the application, or simply information regarding the architectural structure of your site.

 

Potential Mitigations

Phase: Policy

Description: 

Recommendations include implementing a security policy within your organization that prohibits backing up web application source code in the webroot.

CVE References