1 | <?php |
||
2 | /* |
||
3 | * success.php |
||
4 | * |
||
5 | * PHP Toolkit for PayPal v0.51 |
||
6 | * http://www.paypal.com/pdn |
||
7 | * |
||
8 | * Copyright (c) 2004 PayPal Inc |
||
9 | * |
||
10 | * Released under Common Public License 1.0 |
||
11 | * http://opensource.org/licenses/cpl.php |
||
12 | * |
||
13 | */ |
||
14 | ?> |
||
15 | |||
16 | <html> |
||
17 | <head><title>::Thank You::</title> |
||
18 | <link rel="stylesheet" type="text/css" href="styles.css"> |
||
19 | </head> |
||
20 | |||
21 | <body bgcolor="ffffff"> |
||
22 | <br> |
||
23 | <br> |
||
24 | <table width="500" border="0" align="center" cellpadding="1" cellspacing="0"> |
||
25 | <tr> |
||
26 | <td align="left" valign="top" bgcolor="#333333"> |
||
27 | <table width="100%" border="0" cellspacing="0" cellpadding="0"> |
||
28 | <tr> |
||
29 | <td align="center" bgcolor="#EEEEEE"><p> </p> |
||
30 | <p>Thank you! Your order has been successfully processed.</p> |
||
31 | <p> </p></td> |
||
32 | </tr> |
||
33 | </table> |
||
34 | </td> |
||
35 | </tr> |
||
36 | </table> |
||
37 | <br> |
||
38 | <table width="500" border="0" align="center" cellpadding="1" cellspacing="0"> |
||
39 | <tr> |
||
40 | <td align="left" valign="top" bgcolor="#333333"> |
||
41 | <table width="100%" border="0" cellspacing="0" cellpadding="0"> |
||
42 | <tr align="left" valign="top"> |
||
43 | <td width="20%" bgcolor="#EEEEEE"> |
||
44 | <table width="100%" border="0" cellspacing="0" cellpadding="3"> |
||
45 | <tr align="left" valign="top"> |
||
46 | <td bgcolor="#EEEEEE">Order Number:</td> |
||
47 | <td bgcolor="#EEEEEE"> |
||
48 | <?= $_POST['txn_id'] ?> |
||
0 ignored issues
–
show
|
|||
49 | </td> |
||
50 | </tr> |
||
51 | <tr align="left" valign="top"> |
||
52 | <td bgcolor="#EEEEEE">Date:</td> |
||
53 | <td bgcolor="#EEEEEE"> |
||
54 | <?= $_POST['payment_date'] ?> |
||
0 ignored issues
–
show
$_POST['payment_date'] can contain request data and is used in output context(s) leading to a potential security vulnerability.
Preventing Cross-Site-Scripting AttacksCross-Site-Scripting allows an attacker to inject malicious code into your website - in particular Javascript code, and have that code executed with the privileges of a visiting user. This can be used to obtain data, or perform actions on behalf of that visiting user. In order to prevent this, make sure to escape all user-provided data:
// for HTML
$sanitized = htmlentities($tainted, ENT_QUOTES);
// for URLs
$sanitized = urlencode($tainted);
General Strategies to prevent injectionIn general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
if ( ! in_array($value, array('this-is-allowed', 'and-this-too'), true)) {
throw new \InvalidArgumentException('This input is not allowed.');
}
For numeric data, we recommend to explicitly cast the data: $sanitized = (integer) $tainted;
![]() |
|||
55 | </td> |
||
56 | </tr> |
||
57 | <tr align="left" valign="top"> |
||
58 | <td width="20%" bgcolor="#EEEEEE"> First Name:</td> |
||
59 | <td width="80%" bgcolor="#EEEEEE"> |
||
60 | <?= $_POST['first_name'] ?> |
||
0 ignored issues
–
show
$_POST['first_name'] can contain request data and is used in output context(s) leading to a potential security vulnerability.
Preventing Cross-Site-Scripting AttacksCross-Site-Scripting allows an attacker to inject malicious code into your website - in particular Javascript code, and have that code executed with the privileges of a visiting user. This can be used to obtain data, or perform actions on behalf of that visiting user. In order to prevent this, make sure to escape all user-provided data:
// for HTML
$sanitized = htmlentities($tainted, ENT_QUOTES);
// for URLs
$sanitized = urlencode($tainted);
General Strategies to prevent injectionIn general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
if ( ! in_array($value, array('this-is-allowed', 'and-this-too'), true)) {
throw new \InvalidArgumentException('This input is not allowed.');
}
For numeric data, we recommend to explicitly cast the data: $sanitized = (integer) $tainted;
![]() |
|||
61 | </td> |
||
62 | </tr> |
||
63 | <tr align="left" valign="top"> |
||
64 | <td bgcolor="#EEEEEE">Last Name:</td> |
||
65 | <td bgcolor="#EEEEEE"> |
||
66 | <?= $_POST['last_name'] ?> |
||
0 ignored issues
–
show
$_POST['last_name'] can contain request data and is used in output context(s) leading to a potential security vulnerability.
Preventing Cross-Site-Scripting AttacksCross-Site-Scripting allows an attacker to inject malicious code into your website - in particular Javascript code, and have that code executed with the privileges of a visiting user. This can be used to obtain data, or perform actions on behalf of that visiting user. In order to prevent this, make sure to escape all user-provided data:
// for HTML
$sanitized = htmlentities($tainted, ENT_QUOTES);
// for URLs
$sanitized = urlencode($tainted);
General Strategies to prevent injectionIn general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
if ( ! in_array($value, array('this-is-allowed', 'and-this-too'), true)) {
throw new \InvalidArgumentException('This input is not allowed.');
}
For numeric data, we recommend to explicitly cast the data: $sanitized = (integer) $tainted;
![]() |
|||
67 | </td> |
||
68 | </tr> |
||
69 | <tr align="left" valign="top"> |
||
70 | <td bgcolor="#EEEEEE">Email:</td> |
||
71 | <td bgcolor="#EEEEEE"> |
||
72 | <?= $_POST['payer_email'] ?> |
||
0 ignored issues
–
show
$_POST['payer_email'] can contain request data and is used in output context(s) leading to a potential security vulnerability.
Preventing Cross-Site-Scripting AttacksCross-Site-Scripting allows an attacker to inject malicious code into your website - in particular Javascript code, and have that code executed with the privileges of a visiting user. This can be used to obtain data, or perform actions on behalf of that visiting user. In order to prevent this, make sure to escape all user-provided data:
// for HTML
$sanitized = htmlentities($tainted, ENT_QUOTES);
// for URLs
$sanitized = urlencode($tainted);
General Strategies to prevent injectionIn general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
if ( ! in_array($value, array('this-is-allowed', 'and-this-too'), true)) {
throw new \InvalidArgumentException('This input is not allowed.');
}
For numeric data, we recommend to explicitly cast the data: $sanitized = (integer) $tainted;
![]() |
|||
73 | </td> |
||
74 | </tr> |
||
75 | </table> |
||
76 | </td> |
||
77 | </tr> |
||
78 | </table> |
||
79 | </td> |
||
80 | </tr> |
||
81 | </table> |
||
82 | <br> |
||
83 | </body> |
||
84 | </html> |
||
85 |
$_POST['txn_id']
can contain request data and is used in output context(s) leading to a potential security vulnerability.1 path for user data to reach this point
$_POST
in success.php on line 48
Preventing Cross-Site-Scripting Attacks
Cross-Site-Scripting allows an attacker to inject malicious code into your website - in particular Javascript code, and have that code executed with the privileges of a visiting user. This can be used to obtain data, or perform actions on behalf of that visiting user.
In order to prevent this, make sure to escape all user-provided data:
General Strategies to prevent injection
In general, it is advisable to prevent any user-data to reach this point. This can be done by white-listing certain values:
For numeric data, we recommend to explicitly cast the data: