Posted by David Dorward on 01/20/06 14:11
Greg N. wrote:
> <?php $planet = $_GET['planet']; ?>
> <h1>This planet is <?php echo "$planet"; ?></h1>
GET is tainted and needs to be sanitised before being dumped into the
page. Currently you are opening up for a cross site scripting attack.
http://uk.php.net/manual/en/function.htmlspecialchars.php should do the
job.
Navigation:
[Reply to this message]
|