While using your bank’s online servicing you notice the following string in the URL bar: “http://
www.MyPersonalBank.com/account?id=368940911028389&Damount=10980&Camount=21”
You observe that if you modify the Damount & Camount values and submit the request, that data on the web
page reflect the changes.
Which type of vulnerability is present on this site?
A.
Web Parameter Tampering
B.
Cookie Tampering
C.
XSS Reflection
D.
SQL injection
Explanation:
The Web Parameter Tampering attack is based on the manipulation of parameters exchanged between client
and server in order to modify application data, such as user credentials and permissions, price and quantity of
products, etc. Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is
used to increase application functionality and control.
https://www.owasp.org/index.php/Web_Parameter_Tampering