Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
Unvalidated redirects and forwards occur when an application does not properly validate user input before redirecting or forwarding requests. Attackers exploit this weakness to redirect users to malicious sites that appear legitimate, leading to phishing attacks, malware downloads, or credential theft.
When an application doesn't validate input properly, it may inadvertently allow attackers to craft URLs that redirect users to malicious sites. This is known as unvalidated redirects and forwards, and it poses a significant risk because users might be tricked into believing they're navigating within a legitimate environment.
This section is not available anymore. Please use the main Exam Page.CCSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
SCha81
2 months, 1 week agoMaciekMT
2 months, 3 weeks agoakg001
5 months, 4 weeks ago