4.3.2 用户枚举测试(中风险)......................................................................................................12
4.3.3 暴力破解测试(中风险)......................................................................................................13
4.3.4 竞争条件测试..........................................................................................................................14
4.3.5 图形验证码测试......................................................................................................................14
4.3.6 密码修改点测试......................................................................................................................14
4.3.7 密码重置点测试......................................................................................................................14
4.3.8 注销登录测试..........................................................................................................................15
4.4 业务逻辑测试(含高风险) .........................................................................................................15
4.4.1 遍历用户信息(高风险)......................................................................................................15
4.5 会话管理测试(含中风险) .........................................................................................................16
4.5.1 会话管理模式测试(中风险) ..............................................................................................16
4.5.2 会话固定测试..........................................................................................................................17
4.5.3 会话变量泄露测试..................................................................................................................17
4.5.4 CSRF 测试..................................................................................................................................17
4.6 敏感信息保护测试(含中风险)..................................................................................................17
4.6.1 用户敏感信息保护(中风险) ..............................................................................................17
4.6.2 业务敏感信息保护..................................................................................................................18
4.7 第三方插件测试 .............................................................................................................................18
4.7.1 Struts2 远程代码执行漏洞测试 ..............................................................................................18
4.8 后门与暗链检查测试 .....................................................................................................................18
4.8.1 后门检查..................................................................................................................................18
4.8.2 暗链检查..................................................................................................................................18
五. 参考与建议 .........................................................................................................................................18
5.1 安全等级评定参考 .........................................................................................................................18
5.1.1 漏洞风险等级评定参考..........................................................................................................18
5.1.2 应用安全等级评定参考..........................................................................................................20
5.2 安全意见 .........................................................................................................................................21
5.2.1 传输安全..................................................................................................................................21