Answer:
Attackers can exploit business logic flaws by manipulating the application's logic to trick the authorization process into granting unauthorized access, bypassing authorization.
Attackers can exploit business logic flaws by manipulating the application's logic to trick the authorization process into granting unauthorized access, bypassing authorization.
You may be interested in:
Web Security MCQs - PART 2