This lab contains a stored cross-site scripting (XSS) vulnerability in the comment functionality.
Submit a comment that calls the alert function when the comment author name is clicked.
<a> tag).href attribute of the anchor element without sanitization.href attribute.Example vulnerable rendering:
<a href="USER-INPUT">AuthorName</a>
In the Website/Author URL field of the comment form, inject:
javascript:alert("xss is here")
The application stores this value in the database.
When displayed, the HTML becomes:
<a href="javascript:alert(\\"xss is here\\")">YourName</a>