Nytro Posted October 3, 2013 Report Posted October 3, 2013 XPATH InjectionAuthored by Chetan SoniThis is a brief whitepaper that covers XPATH injection attacks and use cases.In a typical Web Application architecture, the data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database.The application queries the server and accesses the information based on the user input. Normally attackers try to extract more information than allowed by manipulating or using the query with specially crafted inputs.Download:http://packetstormsecurity.com/files/download/123483/xpath-injection.pdfSursa: XPATH Injection ? Packet Storm Quote