I’ve lost count of the number of times i’ve seen this bit of HTML / PHP:
<form method="post" action="<?php print $_SERVER['PHP_SELF"]; ?>">
Looks pretty harmless doesn’t it, but it is a pretty dangerous shortcut to use. Imagin I get a user to visit the page the form is on by following this link, maybe hiding it in a short url:
where I’ve added some html into the url which contains a script tag.
I could use this method to grab all your cookies and log in as you, or send ajax requests back to the site on your behalf. All very frightening. The quick solution is to turn html characters into their harmless entities using the php function htmlspecialchars. So the code would be
<form method="post" action="<?php print htmlspecialchars($_SERVER['PHP_SELF']); ?>">
But wait! The best way to submit to the same page with a form is to use and empty action attribute. It’s valid and it works.
<form method="post" action="">
Don’t believe me? Go tell Jesse. He also wrote about empty action attributes.