How are Common Gateway Interface (CGI) script intrusions implemented and prevented?

What will be an ideal response?


If the Web server isn't configured correctly, a remote user can run CGI scripts as a root user. The file system is a major vulnerability, so a remote user might be able to install and run a CGI script from a poorly secured /tmp directory and gain unauthorized access to the server. Configuring the Web server to run CGI scripts only from specified locations prevents CGI script intrusions.

Computer Science & Information Technology

You might also like to view...

Name two ways (show statements) in which a value can be accessed in a program.

What will be an ideal response?

Computer Science & Information Technology

The statement, 'or '1'='1, always returns ____.

A. true B. false C. yes D. no

Computer Science & Information Technology

Which of the following is the dotted-decimal notation (DDN) equivalent of /18?

A) 255.255.128.0 B) 255.255.192.0 C) 255.255.224.0 D) 255.255.240.0

Computer Science & Information Technology

________ memory cards are a form of a solid-state storage device widely used in smartphones, digital media players, and GPS navigation systems.

A. Digital versatile disc B. SSD C. RAID D. Flash

Computer Science & Information Technology