A learning pig
- New essay
- Administration
Essay - 56 articles - 0 comments - 4
The common point of both vulnerability mining is to analyze the decisive parameters of this function
Ultra vires detect parameters that determine the identity of the function to be used
Logic vulnerability tests the parameters that determine the function effect
For example, an article editing function
To find the ultra vires vulnerability, you can see whether its ID determines the parameters, and judge whether other articles can be modified by modifying the ID. This is the operation disguised as someone else's identity
However, as long as you focus on the function and related parameters. Don't pay too much attention to how to classify.
Refresh comments refresh page back to top