As described in Chapter 4, the application may contain functions else-
where that you can leverage to return the opaque string resulting from a
piece of plaintext you control. In this situation, you may be able to
directly obtain the required string to deliver an arbitrary payload to the
function you are targeting.
■
Even if the opaque string is completely impenetrable, it may be possible
to replay its value in other contexts, to achieve some malicious effect. For
example, the
enc
parameter in the previously shown form may contain
an encrypted version of the product’s price. Although it is not possible to
produce the encrypted equivalent for an arbitrary price of your choosing,
you may be able to copy the encrypted price from a different, cheaper
Do'stlaringiz bilan baham: |