As a security professional, what should you do after identifying that a Web server you are testing is using PHP?

What will be an ideal response?


After you have identified the Web server as using PHP, you should investigate further for specific vulnerabilities. Several versions of PHP running on Linux can be exploited because of a line in the Php.ini file: The line file_uploads=on permits file uploads; however, this setting might allow a remote attacker to run arbitrary code with elevated privileges. The best solution is to upgrade to the latest version of PHP, but if that's not possible, change the line to file_uploads=off.

Computer Science & Information Technology

You might also like to view...

The remove(Object theElement) method of the ArrayList class returns:

a. Int b. Double c. Byte d. Boolean

Computer Science & Information Technology

The document body in an XML document is made up of elements that contain data to be stored in the document. Elements are the basic building blocks of XML files. List three important points to remember about XML elements.

What will be an ideal response?

Computer Science & Information Technology

The ____ panel includes different options used to align a group of selected objects on the Stage.

A. Display B. Center C. Select D. Align

Computer Science & Information Technology

The ____________________ tool performs a DNS lookup and finds detailed information about the queried nameservers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology