List of questions
Related questions
Question 166 - CS0-003 discussion
A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the following output:
[+] XSS: In form input 'txtSearch' with action https://localhost/search.aspx
[-] XSS: Analyzing response #1...
[-] XSS: Analyzing response #2...
[-] XSS: Analyzing response #3...
[+] XSS: Response is tainted. Looking for proof of the vulnerability.
Which of the following is the most likely reason for this vulnerability?
A.
The developer set input validation protection on the specific field of search.aspx.
B.
The developer did not set proper cross-site scripting protections in the header.
C.
The developer did not implement default protections in the web application build.
D.
The developer did not set proper cross-site request forgery protections.
Your answer:
0 comments
Sorted by
Leave a comment first