Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.
因此,攻击者可能作为一个有效用户通过认证,然后提供一个HTTP 消息头(可能为 iv-cred ),这个消息头表明他比实际上有更多的权限。
Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.
因此,攻击者可能作为一个有效用户通过认证,然后提供一个HTTP 消息头(可能为 iv-cred ),这个消息头表明他比实际上有更多的权限。
应用推荐