medium
Single Answer
0Alekos is analyzing a web application that his organization acquired from a third-party vendor. Alekos determined that the application contains a flaw that causes users who are logged in to be able to take actions they should not be able to in their role. What type of security vulnerability should this be classified as?
Answer Options
A
Data validation
B
Session management
C
Authorization
D
Error handling
Correct Answer: C
Explanation
Given the list of options here, the root cause is most likely an issue with an authorization check that does not properly limit users to the authorization that they should have. Data validation issues are more likely to allow injection attacks or to allow bad data to be input, while session management issues would allow session hijacking or might actually cause them to be logged in as another user. Finally, error handling would show up as a problem when errors occurred, which this problem does not indicate.