Home > Web Front-end > JS Tutorial > Don't underestimate the security issues caused by commented out JS_javascript tips

Don't underestimate the security issues caused by commented out JS_javascript tips

WBOY
Release: 2016-05-16 18:57:14
Original
1142 people have browsed it

One is the problem of header insertion.
The other is the rn problem.
Let’s look at this piece of code:
1. test
2.

Everyone can see that there seems to be a loophole, but it has been patched and commented out.
Now that it’s commented out, shouldn’t there be a problem?
No.
Look at this URL again
http://localhost/index.jsp?username=kxlzx alert('kxlzx
Isn’t it frustrating?
The following code was generated:
test


The commented out JS was also executed. <script> <BR>3. //alert('<%=request.getParameter("username")%>'); <BR>4. </script>So, don’t use useless The code, commented out JS, etc. are thrown into html. <script> <BR>//alert('kxlzx <BR>alert('kxlzx '); <BR></script>Code review is a delicate job, and any omissions are worth noting.

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template