The application, a user or a role have more privileges than they require.
This can be leveraged by an attacker to execute normally restricted actions on
R186. Use the principle of least privilege
R095. Define users with privileges
R096. Set user required privileges
Ready to start with Fluid Attacks?
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.