From 9b906a2a29b6b52dc9fcb9d97f127c4578369826 Mon Sep 17 00:00:00 2001 From: Pei Hsuan Hung Date: Wed, 25 Sep 2019 00:37:36 +0800 Subject: [PATCH] Fix typo in XXE lesson --- .../xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc b/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc index 4b8b0f3f7..98e3af1f5 100644 --- a/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc +++ b/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc @@ -19,7 +19,7 @@ An entity must be created in the Document Type Definition (DTD), let's start wit &js; ---- -So everywhere you use the entity ``&js;` the parser will replace it with the value defined in the entity. +So everywhere you use the entity `&js;` the parser will replace it with the value defined in the entity. === What is an XXE injection? @@ -38,4 +38,4 @@ In general we can distinguish the following kind of XXE attacks: * Classic: in this case an external entity is included in a local DTD * Blind: no output and or errors are shown in the response -* Error: try to get the content of a resource in the error message \ No newline at end of file +* Error: try to get the content of a resource in the error message