Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Type of vulnerability and also correct the code. options are listed below 1 package com.scw.airplaneshop.util; import lombok. extern.log4j.Log4j; import javax.servlet.http.HttpServletRequest; 6 import javax.xmi.bind.DatatypeConverter; 7 import
Type of vulnerability and also correct the code. options are listed below
1 package com.scw.airplaneshop.util; import lombok. extern.log4j.Log4j; import javax.servlet.http.HttpServletRequest; 6 import javax.xmi.bind.DatatypeConverter; 7 import java.io. Fileinputstream; 8 import java.io. IOException; 9 import java.io.UnsupportedEncodingException; 10 import java.security. Messagedigest; 11 import java.security.NoSuchA1gorithmExceptions 12 import java.uti1.0ptionaly 13 import java.uti1. Propertiess 15 import static com, scw, airpianeshop, uti1, Constants. EMPTYSTRING; 7 og4j 18 public final class Utils t private final static Sterins condh = ", " public final static Stain: REPiEFILE = "sre/main/resources/appidcation.properties 5 private static Properies propentes final String xfileder = requet . othectar (x= riangi ); if (xrizader = nu11) t return raquet.ojthiziotedid()s fionliznild a rit 3 public static optionalestring gethescriptioniath() \{ return optional.otinlmble(cetproperties() - Eeteroperty ("con.scw.airplaneshop.discription.path"))s Select Vulnerability Category Identily the type of vulnerability present in the code and select it from the options below. The vilneroble files and lines of code hove been marked with 0. Security Misconfiguration Dehug Feetures Enrhtid Cross site Request Forgery Injection Fliws Desedilization of Untrusted Data submit
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started