Fixed a possible XSS attack flaw

This commit is contained in:
Marion Muszynski 2016-09-14 12:37:07 +02:00
parent 18708e534f
commit fed2f9d357

View File

@ -71,10 +71,10 @@
<tr class="{if $smarty.section.friends.index % 2}item{else}alternate_item{/if}">
<td class="align_right">{$smarty.section.friends.iteration}</td>
{if $askName}
<td><input type="text" class="text firstname" name="friendsFirstname[{$smarty.section.friends.index}]" size="20" value="{if isset($smarty.post.friendsFirstname[$smarty.section.friends.index])}{$smarty.post.friendsFirstname[$smarty.section.friends.index]}{/if}" /></td>
<td><input type="text" class="text lastname" name="friendsFLastname[{$smarty.section.friends.index}]" size="20" value="{if isset($smarty.post.friendsFLastname[$smarty.section.friends.index])}{$smarty.post.friendsFLastname[$smarty.section.friends.index]}{/if}" /></td>
<td><input type="text" class="text firstname" name="friendsFirstname[{$smarty.section.friends.index}]" size="20" value="{if isset($smarty.post.friendsFirstname[$smarty.section.friends.index])}{$smarty.post.friendsFirstname[$smarty.section.friends.index]|escape:'htmlall':'utf-8'}{/if}" /></td>
<td><input type="text" class="text lastname" name="friendsFLastname[{$smarty.section.friends.index}]" size="20" value="{if isset($smarty.post.friendsFLastname[$smarty.section.friends.index])}{$smarty.post.friendsFLastname[$smarty.section.friends.index]|escape:'htmlall':'utf-8'}{/if}" /></td>
{/if}
<td><input type="text" class="text email" name="friendsEmail[{$smarty.section.friends.index}]" size="20" value="{if isset($smarty.post.friendsEmail[$smarty.section.friends.index])}{$smarty.post.friendsEmail[$smarty.section.friends.index]}{/if}" /></td>
<td><input type="text" class="text email" name="friendsEmail[{$smarty.section.friends.index}]" size="20" value="{if isset($smarty.post.friendsEmail[$smarty.section.friends.index])}{$smarty.post.friendsEmail[$smarty.section.friends.index]|escape:'htmlall':'utf-8'}{/if}" /></td>
</tr>
{/section}
</tbody>