Which of the following vulnerabilities has the tester exploited?

A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider’s metadata and get the credentials used by the instance to authenticate itself.

Which of the following vulnerabilities has the tester exploited?
A . Cross-site request forgery
B. Server-side request forgery
C. Remote file inclusion
D. Local file inclusion

Answer: B

Explanation:

Reference: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery

Latest PT0-002 Dumps Valid Version with 110 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments