Unrestricted Upload of File with Dangerous Type vulnerabilities allows attackers to upload malicious code. This course introduces ways to identify and mitigate this security weakness, referenced as CWE-434 by the 2020 CWE Top 25.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Identify Unrestricted Upload (of File with Dangerous Type) vulnerabilities
- Recognize the potential impact of this vulnerability
- Apply coding best practices to avoid it
- Find Unrestricted Upload (of File with Dangerous Type) vulnerabilities in your applications source code
- Test your application to detect it
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):