Answer:
Attackers can use SSRF to manipulate the server to make requests to sensitive files, bypassing security controls and potentially gaining unauthorized access.
Attackers can use SSRF to manipulate the server to make requests to sensitive files, bypassing security controls and potentially gaining unauthorized access.
You may be interested in:
Web Security MCQs - PART 2