Which of the following attacks allows an attacker to access restricted directories, including application source code…?

Which of the following attacks allows an attacker to access restricted directories, including
application source code, configuration and critical system files, and to execute commands outside
of the web server’s root directory?

Which of the following attacks allows an attacker to access restricted directories, including
application source code, configuration and critical system files, and to execute commands outside
of the web server’s root directory?

A.
Unvalidated input

B.
Parameter/form tampering

C.
Directory traversal

D.
Security misconfiguration



Leave a Reply 0

Your email address will not be published. Required fields are marked *