A penetration tester finds that an application responds with the contents of the /etc/passwd file when the following payload is sent:
<!DOCTYPE data [ ]>
Which of the following should the tester recommend in the report to best prevent this type of vulnerability?
Submit