HACK STEPS (continued)
■
Roles defined at the application server layer are often coarsely defined
and may be incomplete.
■
Where application components run using low-privileged operating sys-
tem accounts, these are still typically able to read many kinds of poten-
tially sensitive data within the host file system. Any vulnerabilities
granting arbitrary file access may still be usefully exploited.
■
Vulnerabilities within the application server software itself will typically
enable you to defeat all access controls implemented within the applica-
Do'stlaringiz bilan baham: