An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
Original URL: http://www.buyonline.com/product.aspx?profile=12&debit=100
Modified URL: http://www.buyonline.com/product.aspx?profile=12&debit=10
Identify the attack depicted in the above scenario.
Berro_b
1 month, 4 weeks agoMan_San
1 year agoSchFiftySchFive
1 year, 4 months agoTeodorus1
1 year, 5 months ago