Question: Which of these examples would be considered Broken Access Control, the top vulnerability listed on OWASP in 2 0 2 1 ? Group of answer
Which of these examples would be considered "Broken Access Control", the top vulnerability listed on OWASP in
Group of answer choices
An attacker can pass a string in as a numeric value and cause a crash in an API call
An API leaks a security token that is easy for other people to copy and paste to make their own requests
A firewall is not configured to block incoming ports to a database server
A webpage takes a query parameter "AccountId", but does not verify that the person requesting the page is allowed to see that account
A webpage fails to check authentication before allowing a visitor to access some data
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
