From bbfa0d393b2c9c18430c20cda60de6267e7e5a6c Mon Sep 17 00:00:00 2001 From: "Devansh Raghav - @vip3r" <79361298+DevanshRaghav75@users.noreply.github.com> Date: Sat, 24 Jul 2021 18:58:15 +0700 Subject: [PATCH] Update README.md --- XXE payloads/README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/XXE payloads/README.md b/XXE payloads/README.md index be128c6..298c33e 100644 --- a/XXE payloads/README.md +++ b/XXE payloads/README.md @@ -110,6 +110,7 @@ ## How to injection these payloads? **You can inject these payload in request like this:**
+ You can see the payload is injected below the headers. Hope you understood! :) ```XML POST /xml_injectable.php HTTP/1.1