Theme Layout

Boxed or Wide or Framed

Wide

Theme Translation

Display Featured Slider

Featured Slider Styles

Display Grid Slider

yes

Grid Slider Styles

Display Trending Posts

Display Author Bio

Display Instagram Footer

off

Dark or Light Style

Light
Powered by Blogger.

Thursday, December 22, 2016

[High] HTML Injection - Reflected (GET)


# Introduction

:BWAPP → Medium→ HTML Injection - reflected (GET)


# Training

: At this level, all of the previous level values are output as plain text as shown below.

<Input value is equal to low level>

<Input value is equal to medium level>

 I checked the source code as well as the medium level. First, I checked the source code of htmli_get.php. At the htmli_get.php, I found that using the xss_check_3 function at high level.


Next, At the Functions_external.php, I could see what this function is.


I found that the htmlspecialchars function bypass the input value. This function is a basic function provided by php. It returns special characters used in HTML as UTF-8.
 So, If you want to prevent HTML injections, you can use this function to make the characters used in HTML tags recognizes as text.
QuickEdit
Unknown
4 Comments
Share This Post :

You Might Also Like

4 comments:

Follow @SunriseSunsetBlog