Skip to Main Content
Information Security: Contemporary Cases
book

Information Security: Contemporary Cases

by Marie A. Wright, John S. Kakalik
August 2010
Intermediate to advanced content levelIntermediate to advanced
214 pages
9h 49m
English
Jones & Bartlett Learning
Content preview from Information Security: Contemporary Cases
directory traversal vulnerability. The GET command allowed users to open
the order.log file (home1/boatingct/cgi-bin/Web_store/Admin_files/
order.log) and copy the file from BoatingCT.com’s machine to their own
machines. Intruders from around the world had gained unauthorized access
to BoatingCT.com’s daily order file, and to its customer order and credit
card information. BoatingCT.com was informed of its software problem by
the FBI. The company upgraded its shopping cart software to the latest
version of WebStore (version 2.0), which was immune to this vulnerability.
This patch had been available since October 2000, six months before the
company’
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Mark Egan
Breaking into Information Security

Breaking into Information Security

Josh More, Anthony J. Stieber, Chris Liu

Publisher Resources

ISBN: 9780763738198