exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 75 discussion

Actual exam question from CompTIA's PT0-002
Question #: 75
Topic #: 1
[All PT0-002 Questions]

During a penetration test, a tester is able to change values in the URL from example.com/login.php?id=5 to example.com/login.php?id=10 and gain access to a web application. Which of the following vulnerabilities has the penetration tester exploited?

  • A. Command injection
  • B. Broken authentication
  • C. Direct object reference
  • D. Cross-site scripting
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RightAsTain
Highly Voted 2 years, 8 months ago
Answer is C. Right out of the book.
upvoted 10 times
...
RRabbit_111
Highly Voted 2 years, 4 months ago
C. Direct object reference During a penetration test, a tester is able to change values in the URL from example.com/login.php?id=5 to example.com/login.php?id=10 and gain access to a web application. This is an example of a direct object reference vulnerability. A direct object reference vulnerability occurs when an application exposes an object's direct reference, such as a file or database record, in the application's user interface. This allows an attacker to access or manipulate objects directly by manipulating the URL or other parameters, bypassing any intended access controls. In this case, the tester was able to gain access to a web application by manipulating the value of the "id" parameter in the URL. It is important to note that options A, B, and D are also potential vulnerabilities that can be identified during a penetration test, but they are not as likely to be identified based on the given scenario as a direct object reference vulnerability. Command injection, Broken authentication, and Cross-site scripting are also common vulnerabilities that can be identified during a penetration test, but they are not related to the scenario where the tester is able to change values in the URL and gain access to a web application.
upvoted 7 times
...
Etc_Shadow28000
Most Recent 10 months, 3 weeks ago
Selected Answer: C
C. Direct object reference Explanation: • Direct object reference: This vulnerability occurs when an application provides direct access to objects based on user-supplied input. In this case, by changing the id value in the URL from 5 to 10, the tester was able to access data or functionality that should not have been accessible, indicating that the application is not properly validating or restricting user input.
upvoted 1 times
...
solutionz
1 year, 9 months ago
Selected Answer: C
The scenario described where the tester changes values in the URL to gain access to a web application is indicative of exploiting a vulnerability known as: C. Direct object reference This vulnerability, also known as Insecure Direct Object References (IDOR), occurs when an application provides direct access to objects based on user-supplied input. In this case, by simply changing the value of the "id" parameter in the URL, the tester was able to access different objects (e.g., user accounts or data records). This kind of vulnerability reveals that there is inadequate access control, and users are able to access objects directly that they shouldn't have access to.
upvoted 1 times
...
ciguy935yaknow
2 years, 1 month ago
Selected Answer: C
Definitely C
upvoted 1 times
...
xviruz2kx
2 years, 1 month ago
Selected Answer: C
C. Direct object reference. The tester was able to change the value in the URL to access a resource that was not intended to be accessible, indicating a direct object reference vulnerability
upvoted 1 times
...
KeToopStudy
2 years, 3 months ago
Selected Answer: C
When the application allows for a user to retrieve another users data it's because of an IDOR vulnerability so the right answer is clearly C.
upvoted 2 times
...
aliaka
2 years, 5 months ago
Selected Answer: C
Answer is C
upvoted 2 times
...
petercorn
2 years, 7 months ago
Selected Answer: C
Insecure direct object reference (IDOR) is a vulnerability where the developer of the application does not implement authorization features to verify that someone accessing data on the site is allowed to access that data.
upvoted 4 times
...
Lee_Lah
2 years, 7 months ago
Selected Answer: C
Agree answer is C.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...