A successful forced browsing attack indicates a vulnerability in
The configuration management
The session management
The change management process
The authorization process