@jonarer
The attacker can now:
User input stored on the server, then included as html
Scripts reading user data and then
writing html(.innerHtml, .outerHtml, .html(), document.write, createElement
)
or executing (eval(), setInterval(), setTimeout(), new Function() or location.replace
)
Predictable requests to a site can be forged
<form action="account.jsp">
<input type="hidden" name="csrf_token" value="FRUjQxPbyqmTtuXxip2tOWEqLFd">
Username: <input type="hidden" name="username" value="user">
Password: <input type="password" name="password">
...
</form>
', ", <, >
...)SELECT, <script>
...) -> validate as strictly as you can given the functional constraints
Technical error messages are interesting!
-> Detailed logs serveside, generic messages to the client