docker-vulnerable-dvwa/dvwa/vulnerabilities/xss_r/source/high.php
2016-12-02 17:19:11 -02:00

13 lines
280 B
PHP

<?php
// Is there any input?
if( array_key_exists( "name", $_GET ) && $_GET[ 'name' ] != NULL ) {
// Get input
$name = preg_replace( '/<(.*)s(.*)c(.*)r(.*)i(.*)p(.*)t/i', '', $_GET[ 'name' ] );
// Feedback for end user
$html .= "<pre>Hello ${name}</pre>";
}
?>