ESI Injection Part 2: Abusing specific implementations

https://www.gosecure.net/blog/2019/05/02/esi-injection-part-2-abusing-specific-implementations