This weakness has been deprecated because it incorporated and
confused multiple weaknesses. The issues formerly covered in this weakness can
be found at CWE-766 and CWE-767.
The application stores sensitive data under the web document
root with insufficient access control, which might make it accessible to
untrusted parties.
The software uses external input to construct a pathname that
is intended to identify a file or directory that is located underneath a
restricted parent directory, but the software does not properly neutralize
special elements within the pathname that can cause the pathname to resolve to a
location that is outside of the restricted directory.
The application stores sensitive data under the FTP document
root with insufficient access control, which might make it accessible to
untrusted parties.
The application truncates the display, recording, or processing
of security-relevant information in a way that can obscure the source or nature
of an attack.