Answer:
Attackers can exploit a business logic flaw related to file upload/download functionalities by manipulating the underlying business logic to upload/download malicious files or bypass intended processes.
Attackers can exploit a business logic flaw related to file upload/download functionalities by manipulating the underlying business logic to upload/download malicious files or bypass intended processes.
You may be interested in:
Web Security MCQs