These attacks send tags to set flags to raise permissions for a user account. Imagine scenarios in which a "User" database table has a bunch of bit type columns for things like isApprover and isPublisher and then imagine a SQL-based attack in which a lot of the false values are flipped to true.
No comments:
Post a Comment