FOLLOW FLUID ATTACKS
It is possible to inject XML code into the application’s requests,
which is then interpreted by the server.
This could allow an attacker to perform data exfiltration
or execute commands remotely.
R173. Discard unsafe inputs
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.