HTML Injection - Reflected (POST)
low
We are provided with two input fields to input the first and last name.
Let's provide the input and intercept the request in Burpsuite.
We can see that the request method is POST.
Let's input the following HTML tag:
First name:
<h1>john</h1>
Last name:
<h2>doe</h2>
medium
Let's intercept the request using Burpsuite.
As we can see, our input HTML characters have been URL encoded.
Let's forward the request to the Repeater
encode the entire input including the name to check if that evades the security filter.
firstname=%3c%68%31%3e%6a%6f%68%6e%3c%2f%68%31%3e&lastname=%3c%68%32%3e%64%6f%65%3c%2f%68%32%3e&form=submit
We have successfully exploited the HTML injection vulnerability.