Lab: GET Parameter Reflection
This lab demonstrates a basic reflected XSS vulnerability where user input from GET parameters is directly reflected in the page without proper sanitization.
Objective: Execute a JavaScript alert using the XSS vulnerability in the form below.
if(isset($_GET["fname"]) && isset($_GET["lname"])){
echo $_GET["fname"];
echo $_GET["lname"];
}