A development team is reviewing their web application for security flaws. They identify a function where user input is directly inserted into a database query. This scenario is a classic example of ____________ vulnerability.

  • Cross-Site Hijacking (XSH)
  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • SQL Injection
The scenario describes an SQL Injection vulnerability, where user input is not properly sanitized before being included in a database query. This allows attackers to manipulate the query and potentially gain unauthorized access to the database. Recognizing and mitigating SQL Injection vulnerabilities are critical aspects of secure coding and web application security.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *