forked from devsecops-test/govwa
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtemplate.xss2.html
55 lines (54 loc) · 2.09 KB
/
template.xss2.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
{{define "template.xss2"}} {{template "template.header" .}} {{template "template.sidebar" .}}
<!-- Modal -->
<div id="profile" class="modal fade" role="dialog">
<div class="modal-dialog modal-sm">
<!-- Modal content-->
<div class="modal-content">
<div class="modal-header">
<h4 class="modal-title">My Profile:</h4>
</div>
<div class="modal-body">
</div>
<div class="modal-footer">
<button type="button" class="btn btn-default" data-dismiss="modal">Close</button>
</div>
</div>
</div>
</div>
<div class="col-md-9">
<div class="panel panel-primary">
<div class="panel-heading">Cross Site Scripting Vulnerability</div>
<div class="panel-body">
<div class="pnl">
<!-- <span class="subheader">SQL Injection Vulnerability</span> -->
<p>All about javascript</p>
<p>Click button to view you profile:</p>
<div class="well">
<button class="btn btn-small btn-primary" id="view">View</button>
</div>
<div class="more-info">
<span>More Info :</span>
<a target="_blank" href="https://excess-xss.com/">https://excess-xss.com/</a>
<a target="_blank" href="https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)">https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)</a>
</div>
</div>
</div>
</div>
</div>
{{.inlineJS}}
<script>
$(document).ready(function(){
$("#view").on('click', function(){
$("#profile").modal("show")
$('#profile').find('.modal-body').append('\
<p>name '+name+'</p>\
<p>City '+city+'</p>\
<p>Number'+number+'</p>\
');
})
$("#profile").on('hidden.bs.modal', function(){
$('#profile').find('.modal-body').html("")
})
})
</script>
{{template "template.footer"}} {{ end }}