Charlie is developing a web application. He ensures that every form input is validated and sanitized before it's processed. Despite this, an attacker is able to inject a script that steals user session cookies. Which vulnerability in the application did the attacker most likely exploit?
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- SQL Injection
The attacker likely exploited a Cross-Site Scripting (XSS) vulnerability, allowing them to inject malicious scripts into the web application despite input validation and sanitization.
Loading...
Related Quiz
- Mike, an IT professional, finds a USB drive in the parking lot with a label reading "Salary Details 2023". Curious, he plugs it into his office computer, leading to the installation of malware. Which social engineering technique successfully targeted Mike?
- In operating system hardening, why might an administrator choose to disable unused services and protocols?
- When an IDS generates an alert for an activity that isn't actually malicious, it's termed as a _______.
- The practice of deliberately leaving vulnerabilities open in a system as a trap to detect and monitor intruders is termed as what?
- Digital certificates are issued by trusted third parties called what?