Mr. Jacob is an ethical hacker. He wants to intrude into mail box of his friend john to
access his personal information.
So he logged into the mail account which resulted in the URL as shown below –http://mail.abc.com/home/user=j4jacob/0/#inbox
He replaces j4jacob with his friends user id john123. Now the update URL is –
http://mail.abc.com/home/user=john123/0/#inbox
He tries with this URL and he could access the mail box of his friend John. What type
of vulnerability you have noticed in the above scenario?
a. Cross Site Scripting
b. Broken Access Controls
c. SQL Injection
d. Broken Authentication