It is possible to inject XML code into the application’s requests,
and it is interpreted by the server.
This could allow an attacker to perform data exfiltration or execute commands
R173. Discard unsafe inputs
Ready to start with Fluid Attacks?
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.