During a security audit, a tester discovers that input fields in a web application are not properly sanitizing input, leading to database queries being altered. This vulnerability is indicative of a ____________.

  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Script Inclusion (XSSI)
  • Cross-Site Scripting (XSS)
  • SQL Injection
The scenario describes a SQL Injection vulnerability, where input is not properly sanitized, allowing an attacker to manipulate database queries. This can lead to unauthorized access or manipulation of data. Understanding SQL Injection is crucial for developers to implement secure coding practices and for security professionals to detect and mitigate such vulnerabilities during audits or assessments.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *