A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:
xml
Copy code
<!DOCTYPE data [
]>
Which of the following should the tester recommend in the report to best prevent this type of vulnerability?
Submit