Closed AustinRozendaal closed 2 years ago
On further experimentation, it turns out inputs like <a
and </
are enough to break it.
Should have checked the ASP.NET logs - I didn't know that IIS blocks potentially dangerous form requests by default. After adding <httpRuntime requestValidationMode="2.0" />
to Web.config and adding ValidateRequest="false"
to the attributes in the Page directive at the top of default.aspx, I am able to submit with no errors.
This is an ASP.NET security feature. disabling it is not recommended though.
If a script is submitted with something resembling an HTML tag in a text input, the script does not run and error.aspx is shown.