@jonarer
The attacker can now:
User input stored on the server, then included as html
Scripts reading user data and then
writing html(.innerHtml, .outerHtml, .html(), document.write, createElement)
or executing (eval(), setInterval(), setTimeout(), new Function() or location.replace)
Predictable requests to a site can be forged
<form action="account.jsp">
<input type="hidden" name="csrf_token" value="FRUjQxPbyqmTtuXxip2tOWEqLFd">
Username: <input type="hidden" name="username" value="user">
Password: <input type="password" name="password">
...
</form>
', ", <, >...)SELECT, <script>...) -> validate as strictly as you can given the functional constraints
Technical error messages are interesting!
-> Detailed logs serveside, generic messages to the client