A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider’s metadata and get the credentials used by the instance to authenticate itself.
Which of the following vulnerabilities has the tester exploited?
A . Cross-site request forgery
B. Server-side request forgery
C. Remote file inclusion
D. Local file inclusion
Answer: B
Explanation:
Reference: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund