セキュリティ アナリストが Web サーバーのログを確認すると、次の行に気付きます。 104.35。45.53 - [22/May/2020:07 : 00:58 +0100] 「GET . UNION ALL SELECT ユーザー ログイン、ユーザー _ パス、wp ユーザーからのユーザー メール -- HTTP/II" 200 1072 http://www.example.com/wordpress/wp-admin/ 攻撃者が悪用しようとしている脆弱性は次のうちどれですか?
正解:D
Explanation SQLi stands for SQL injection, which is a type of web security vulnerability that allows an attacker to execute malicious SQL statements on a database server. SQLi can result in data theft, data corruption, denial of service, or remote code execution. The attacker in the web server log is trying to exploit a SQLi vulnerability by sending a malicious GET request that contains a UNION ALL SELECT statement. This statement is used to combine the results of two or more SELECT queries into a single result set. The attacker is attempting to retrieve user login, user pass, and user email from the wp users table, which is a WordPress database table that stores user information. The attacker may use this information to compromise the WordPress site or the users' accounts.