dvwa updated
This commit is contained in:
parent
8f3c3af4fb
commit
c37af6fc80
84 changed files with 1873 additions and 605 deletions
79
dvwa/vulnerabilities/xss_d/index.php
Normal file
79
dvwa/vulnerabilities/xss_d/index.php
Normal file
|
|
@ -0,0 +1,79 @@
|
|||
<?php
|
||||
|
||||
define( 'DVWA_WEB_PAGE_TO_ROOT', '../../' );
|
||||
require_once DVWA_WEB_PAGE_TO_ROOT . 'dvwa/includes/dvwaPage.inc.php';
|
||||
|
||||
dvwaPageStartup( array( 'authenticated', 'phpids' ) );
|
||||
|
||||
$page = dvwaPageNewGrab();
|
||||
$page[ 'title' ] = 'Vulnerability: DOM Based Cross Site Scripting (XSS)' . $page[ 'title_separator' ].$page[ 'title' ];
|
||||
$page[ 'page_id' ] = 'xss_d';
|
||||
$page[ 'help_button' ] = 'xss_d';
|
||||
$page[ 'source_button' ] = 'xss_d';
|
||||
|
||||
dvwaDatabaseConnect();
|
||||
|
||||
$vulnerabilityFile = '';
|
||||
switch( $_COOKIE[ 'security' ] ) {
|
||||
case 'low':
|
||||
$vulnerabilityFile = 'low.php';
|
||||
break;
|
||||
case 'medium':
|
||||
$vulnerabilityFile = 'medium.php';
|
||||
break;
|
||||
case 'high':
|
||||
$vulnerabilityFile = 'high.php';
|
||||
break;
|
||||
default:
|
||||
$vulnerabilityFile = 'impossible.php';
|
||||
break;
|
||||
}
|
||||
|
||||
require_once DVWA_WEB_PAGE_TO_ROOT . "vulnerabilities/xss_d/source/{$vulnerabilityFile}";
|
||||
|
||||
# For the impossible level, don't decode the querystring
|
||||
$decodeURI = "decodeURI";
|
||||
if ($vulnerabilityFile == 'impossible.php') {
|
||||
$decodeURI = "";
|
||||
}
|
||||
|
||||
$page[ 'body' ] = <<<EOF
|
||||
<div class="body_padded">
|
||||
<h1>Vulnerability: DOM Based Cross Site Scripting (XSS)</h1>
|
||||
|
||||
<div class="vulnerable_code_area">
|
||||
|
||||
<p>Please choose a language:</p>
|
||||
|
||||
<form name="XSS" method="GET">
|
||||
<select name="default">
|
||||
<script>
|
||||
if (document.location.href.indexOf("default=") >= 0) {
|
||||
var lang = document.location.href.substring(document.location.href.indexOf("default=")+8);
|
||||
document.write("<option value='" + lang + "'>" + $decodeURI(lang) + "</option>");
|
||||
document.write("<option value='' disabled='disabled'>----</option>");
|
||||
}
|
||||
|
||||
document.write("<option value='English'>English</option>");
|
||||
document.write("<option value='French'>French</option>");
|
||||
document.write("<option value='Spanish'>Spanish</option>");
|
||||
document.write("<option value='German'>German</option>");
|
||||
</script>
|
||||
</select>
|
||||
<input type="submit" value="Select" />
|
||||
</form>
|
||||
</div>
|
||||
EOF;
|
||||
|
||||
$page[ 'body' ] .= "
|
||||
<h2>More Information</h2>
|
||||
<ul>
|
||||
<li>" . dvwaExternalLinkUrlGet( 'https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)' ) . "</li>
|
||||
<li>" . dvwaExternalLinkUrlGet( 'https://www.owasp.org/index.php/Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)' ) . "</li>
|
||||
<li>" . dvwaExternalLinkUrlGet( 'https://www.acunetix.com/blog/articles/dom-xss-explained/' ) . "</li>
|
||||
</ul>
|
||||
</div>\n";
|
||||
|
||||
dvwaHtmlEcho( $page );
|
||||
|
||||
?>
|
||||
Loading…
Add table
Add a link
Reference in a new issue