Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This example is vulnerable to the attack described earlier. If it is passed the attack string for username described previously, the described earlier is passed to evaluate(), the method call returns the corresponding node in the XML file. This causes the doLogin() method to return true and bypass any authorization.

...