diff --git a/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc b/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc index 4b8b0f3f7..98e3af1f5 100644 --- a/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc +++ b/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_intro.adoc @@ -19,7 +19,7 @@ An entity must be created in the Document Type Definition (DTD), let's start wit &js; ---- -So everywhere you use the entity ``&js;` the parser will replace it with the value defined in the entity. +So everywhere you use the entity `&js;` the parser will replace it with the value defined in the entity. === What is an XXE injection? @@ -38,4 +38,4 @@ In general we can distinguish the following kind of XXE attacks: * Classic: in this case an external entity is included in a local DTD * Blind: no output and or errors are shown in the response -* Error: try to get the content of a resource in the error message \ No newline at end of file +* Error: try to get the content of a resource in the error message