Entendiendo la inyección XPath con ejemplos prácticos.

En este escrito aprenderás acerca de inyecciones Xpath e intentaré ser lo mas claro posible.

XPath injection vulnerabilities arise when user-controllable data is incorporated into XPath queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Depending on the purpose for which the vulnerable query is being used…