Melanie, a professional hacker, is attempting to break into a target network through an application server. In this process, she identified a logic flaw in the target web application that provided visibility into the source code. She exploited this vulnerability to launch further attacks on the target web application.
Which of the web application vulnerabilities was identified by Melanie in the above scenario?
Melanie discovered alogic flawin the target web application that allowed her to view thesource code. This flaw indicates asecurity misconfiguration, which can lead to further attacks.Security misconfigurations occur when an application or system is not properly configured, leaving it vulnerable to exploitation.Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide12.
Currently there are no comments in this discussion, be the first to comment!