Cross-Site-Scripting "Reflected" Beispiele: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde neu angelegt: „<pre> <!DOCTYPE html> <html> <body> <div> <h1>Vulnerability: Reflected Cross Site Scripting (XSS)</h1> <div> <form nam…“) |
|||
| Zeile 1: | Zeile 1: | ||
| − | < | + | <syntaxhighlight lang=html> |
<!DOCTYPE html> | <!DOCTYPE html> | ||
<html> | <html> | ||
| Zeile 26: | Zeile 26: | ||
</body> | </body> | ||
</html> | </html> | ||
| − | </ | + | </syntaxhighlight> |
Version vom 6. März 2023, 13:25 Uhr
<!DOCTYPE html>
<html>
<body>
<div>
<h1>Vulnerability: Reflected Cross Site Scripting (XSS)</h1>
<div>
<form name="XSS" action="#" method="GET">
<p>
What's your name?
<input type="text" name="name">
<input type="submit" value="Submit">
</p>
</form>
</div>
</div>
<?php
if( array_key_exists( "name", $_GET ) && $_GET[ 'name' ] != NULL ) {
echo '<pre>Hello ' . $_GET[ 'name' ] . '</pre>';
}
?>
</body>
</html>