In
the field, one would not expect code like this
to pass even the most cur-
sory security review. However, the same conceptual flaw is much more likely
to exist in more complex mechanisms in which numerous layered method
invocations are made, in which many potential errors may arise and be han-
dled in different places, and where the more complicated validation logic may
involve maintaining significant state about the progress of the login.
HACK STEPS
■
Do'stlaringiz bilan baham: