Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user's valid credentials?
THE CORRECT ANSWER IS CRF!!
Cross-site Request Forgery (CSRF) is a type of confused deputy attack, which leverages the authentication and authorization of the victim when a forged request is being sent to the web server. Therefore, a CSRF vulnerability that affects highly privileged users, such as administrators, could result in a full application compromise. During a successful CSRF attack, the victim’s web browser is tricked by a malicious website into unwanted action – it sends HTTP requests to the web application as intended by the attacker. Normally, such a request would involve submitting forms present on the web application to alter some data.
https://www.acunetix.com/blog/articles/cross-site-request-forgery/
https://books.google.com/books?id=WHLWDwAAQBAJ&pg=PT28&lpg=PT28&dq=Which+of+the+following+threat+types+involves+leveraging+a+user%27s+browser+to+send+untrusted+data+to+be+executed+with+legitimate+access+via+the+user%27s+valid+credentials?&source=bl&ots=Y5ROsIMP2W&sig=ACfU3U3tpq5jrwP9FYzCixYUpJK_mMESwA&hl=en&sa=X&ved=2ahUKEwibnpXm8ff8AhWNkIkEHWwmDqgQ6AF6BAgfEAM#v=onepage&q&f=false
states the exact explanation Answer D - CSRF
Answer - C
OWASP 10 - XSS flaws occur whenever an application includes untrusted data in a new web page without
proper validation or escaping, or updates an existing web page with user supplied data using a
browser API that can create HTML or JavaScript. XSS allows attackers to execute scripts in the
victim’s browser which can hijack user sessions, deface web sites, or redirect the user to
malicious sites.
Correct Answer: D
Cross-Site Request Forgery (CSRF) A CSRF attack forces an
authenticated client that a user has open to send forged requests under their
own credentials to execute commands and requests that the application thinks
are coming from a trusted client and user. Although an attacker cannot use this
type of attack to steal data directly, because they have no way to see the results
of the commands, it does open up other ways to compromise an application. If
the authenticated user has permissions as a regular user of a system, CSRF could
be used to execute any portion of the application where they have access.
upvoted 5 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ArizonaClassics
Highly Voted 4 years, 10 months agomuyenzo
Highly Voted 4 years, 11 months agoLee_Lah
Most Recent 9 months, 1 week agoPika26
1 year, 6 months agonelombg
1 year, 7 months agogbabes
1 year, 9 months agogbabes
1 year, 9 months agoAJ2021
2 years agokepalon
2 years, 8 months agoBigMomma4752
2 years, 10 months agoIrivera
3 years, 10 months agoroki
4 years, 1 month agoKanthie
4 years, 1 month agoichnos
4 years, 1 month ago