With DocHub, you can quickly wipe out URL in Sxw from anywhere. Enjoy features like drag and drop fields, editable textual content, images, and comments. You can collect electronic signatures securely, add an additional layer of protection with an Encrypted Folder, and collaborate with teammates in real-time through your DocHub account. Make adjustments to your Sxw files online without downloading, scanning, printing or mailing anything.
You can find your edited record in the Documents tab of your account. Edit, submit, print, or turn your document into a reusable template. With so many robust features, it’s easy to enjoy effortless document editing and managing with DocHub.
In the last video we had our first example of cross site scripting due to a shitty php app. But at the end we fixed our php code, by escaping the user supplied string. But I got this code from this tutorial website - and that one is still vulnerable. So lets play around with that one. The code here is loaded in an iframe below. An iframe is like another webpage embedded in this main webpage. With right click we can investigate this iframe and for example display its source code. Now we also know the direct URL to this example. So last time we tried to put a script tag with alert into the name field. But when we do that there will be no alert popup box and we get an error in the Javascript console, showing us that the Chrome XSS Auditor prevented the execution of it. The XSS Auditor is special to chrome. Not every browser has such a protection. For example Firefox does not have an equivalent and will happily execute the alert. But we want to dig deeper. We want to not give up because