HTML escape substituted parameter values to avoid injection attacks.
This commit is contained in:
parent
7b172efeb6
commit
2cbcabb3f6
7 changed files with 39 additions and 37 deletions
|
@ -3,7 +3,7 @@
|
|||
<h2>Send a new message to <%= display_name %></h2>
|
||||
|
||||
<% if params[:display_name] %>
|
||||
<p>Writing a new message to <%= params[:display_name] %></p>
|
||||
<p>Writing a new message to <%= h(params[:display_name]) %></p>
|
||||
<p>TODO: drop down box of your friends</p>
|
||||
<%end%>
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue