DVWA——XSS(DOM)(low)

XSS(DOM)

interface

Insert picture description here

Source code


<?php

# No protections, anything goes

?>

Infiltration step

          The first step: Click the select button and find that the url column has changed, and it is learned that the get method is used.
Insert picture description here
          Step 2: Modify English to, press Enter to access the modified url, find a pop-up window, and the injection is successful.
Insert picture description here

Guess you like

Origin blog.csdn.net/qq_37589805/article/details/112589626