AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: An application utilizes a browser token to iscc video

Question 1 Be Honest
« Back   Next cc Certification Question »
Answer

Full Certification Question

An application utilizes a browser token to maintain state, but it doesn't have any validation processes in place to ensure that the token is submitted by the original and valid obtained of the token. An attacker was able to hijack a browser token and gain unauthorized access to application. Which of the OWASP Top 10 vulnerabilities is this an example of?