docker-vulnerable-dvwa/dvwa/vulnerabilities/xss_r/source/medium.php
2016-12-02 17:19:11 -02:00

13 lines
253 B
PHP

<?php
// Is there any input?
if( array_key_exists( "name", $_GET ) && $_GET[ 'name' ] != NULL ) {
// Get input
$name = str_replace( '<script>', '', $_GET[ 'name' ] );
// Feedback for end user
$html .= "<pre>Hello ${name}</pre>";
}
?>