Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In this noncompliant code example, a user name and password are read from the user and used to construct the query string. The password is passed as a char array, and then hashed, all to comply with MSC51-J. Store passwords using a hash function and MSC63-JG. Limit the lifetime of sensitive data.

This example is vulnerable to the attack described above. If it is passed the attack string for login described  described previously, the evaluate() method call returns the corresponding login node in the XML file, causing . This causes the login() method to return true and bypass any authorization.

...