Which of the following types of vulnerabilities is being exploited?

A penetration tester is testing a banking application and uncovers a vulnerability. The tester is logged in as a non-privileged user who should have no access to any data.

Given the data below from the web interception proxy

Request

POST /Bank/Tax/RTSdocuments/ HTTP 1.1

Host: test.com

Accept: text/html; application/xhtml+xml

Referrer: https://www.test.com/Bank/Tax/RTSdocuments/

Cookie: PHPSESSIONID: ;

Content-Type: application/form-data;

Response

403 Forbidden

<tr>

<td> Error:</td></tr>

<tr><td> Insufficient Privileges to view the data. </td></tr>

Displaying 1-10 of 105 records

Which of the following types of vulnerabilities is being exploited?
A . Forced browsing vulnerability
B . Parameter pollution vulnerability
C . File upload vulnerability
D . Cookie enumeration

Answer: A

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments