Topic 1: Input-validation vulnerabilities Flashcards
1
Q
what is a command injection?
A
attacker can insert arbitrary commands on the host OS via a vulnerable application
2
Q
when is command injection possible?
A
when an application passes an unsafe input
3
Q
what is a path traversal?
A
attacker provides a path as input for navigational purposes