Hello folks,
In short, this code is vulnerable:
<div class="search">
<form action="/search" method="get" name="header_search">
<label>{l t='Search Business'} <input name="searchtext" type="text" id="searchtext" placeholder="{l t='e.g.Marriott'}" /></label>
<label>{l t='City'} <input name="cityname" type="text" id="Hsearchcity" autocomplete="off" placeholder="{l t='All Cities'}" class="commentColor cityname"/>
</label>
<a onclick="header_search.submit()" href="javascript:void(0)">{l t='Search'}</a>
</form>
</div>
I have been trying to implement unhtmlentities(), or htmlspecialchars() functions with no success, how can it be done please ??