Cross-Site-Scripting "Reflected" Beispiele: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 3: | Zeile 3: | ||
<html> | <html> | ||
<body> | <body> | ||
| − | |||
<h1>Vulnerability: Reflected Cross Site Scripting (XSS)</h1> | <h1>Vulnerability: Reflected Cross Site Scripting (XSS)</h1> | ||
| − | |||
<form name="XSS" action="#" method="GET"> | <form name="XSS" action="#" method="GET"> | ||
<p> | <p> | ||
| Zeile 13: | Zeile 11: | ||
</p> | </p> | ||
</form> | </form> | ||
| − | |||
| − | |||
| − | |||
| − | |||
<?php | <?php | ||
| − | + | if( $_GET[ 'name' ] != NULL ) { | |
| − | if( | + | echo 'Hello ' . $_GET[ 'name' ] ; |
| − | echo ' | ||
} | } | ||
| − | |||
?> | ?> | ||
</body> | </body> | ||
</html> | </html> | ||
| + | |||
</syntaxhighlight> | </syntaxhighlight> | ||
Version vom 6. März 2023, 13:32 Uhr
<!DOCTYPE html>
<html>
<body>
<h1>Vulnerability: Reflected Cross Site Scripting (XSS)</h1>
<form name="XSS" action="#" method="GET">
<p>
What's your name?
<input type="text" name="name">
<input type="submit" value="Submit">
</p>
</form>
<?php
if( $_GET[ 'name' ] != NULL ) {
echo 'Hello ' . $_GET[ 'name' ] ;
}
?>
</body>
</html>