Say I have a web application that accepts a parameter called "content". Whatever is present in this parameter will be output as a part of the HTML response.
Example JSP code:
<%= request.getParameter("content") %>
I know this is silly and it should be sanitized and so on, but my question is if an attacker can actually take advantage of this? The way I understand it you'd only change the content sent to yourself, so the only one an attacker could hurt is himself? Correct?