Sara, a hacker, is completing a website form to request a free coupon. The site has a field that limits the
request to 3 or fewer coupons. While submitting the form, Sara runs an application on her machine to intercept
the HTTP POST command and change the field from 3 coupons to 30.
Which of the following was used to perform this attack?
When a web user takes advantage of a weakness with SQL by entering values that they should not, it is known
as a SQL injection attack. Similarly, when the user enters values that query XML (known as XPath) with values
that take advantage of exploits, it is known as an XML injection attack. XPath works in a similar manner to SQL,
except that it does not have the same levels of access control, and taking advantage of weaknesses within can
return entire documents. The best way to prevent XML injection attacks is to filter the user’s input and sanitize it
to make certain that it does not cause XPath to return more data than it should.