An administrator discovers the following log entry on a server.
Nov 12 2013 00:23:45 httpd[2342]: /app2/prod/process.php?input=change.cd%20./././ect:
cat%20shadow
Which of the following attacks is being attempted?
A.
Command injection
B.
Password attack
C.
Buffer overflow
D.
Cross-site scripting