Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
The theme of it pub is to take the science and technology route, so look beautiful, atmosphere.
But yesterday my website in Baidu Webmaster Tools detect vulnerabilities, found an XSS cross-site scripting loophole, finally resolved, take out to share under.
The reason is the search place:
The original search code is like this,
< form id= "Searchform" method= "get" action= < php bloginfo (' home ');? > "> < input type=" submit "value=" "id=" Searchsubmit "class=" button "> < input type=" text "id=" s "name=" s " Value= "" > </form >
Baidu gave the result no hint where, so again in Scanv test a bit, just know is here the problem.
The solution is simple:
The following code will be overwritten with the original search code.
< form id= "Searchform" method= "Get" action= "> < input type=" submit "value=" <? php the_search_query ();? > "id=" searchsubmit "class=" button "> < input type=" text "id=" s "name=" s "value=" "> </form>
In the use of Baidu detection and SCANV detection when the hint no loopholes.
Article from: http://www.51onb.com