mirror of
https://github.com/friendica/friendica
synced 2024-11-13 05:02:54 +00:00
6f9e15ea57
- This could allow code injection from a malicious query leading to a form page - Thanks to Laura Pîrcălăboiu for the report
11 lines
686 B
Smarty
11 lines
686 B
Smarty
<div class="form-group field input file">
|
|
<label for="id_{{$field.0}}" id="label_{{$field.0}}">{{$field.1}}{{if $field.4}} <span class="required" title="{{$field.4}}">*</span>{{/if}}</label>
|
|
<div class="input-group" id="{{$field.0}}">
|
|
<input class="form-control file" name="{{$field.0}}" id="id_{{$field.0}}" type="text" value="{{$field.2}}"{{if $field.4}} required{{/if}} aria-describedby="{{$field.0}}_tip">
|
|
<span class="input-group-addon image-select"><i class="fa fa-picture-o"></i></span>
|
|
</div>
|
|
{{if $field.3}}
|
|
<span class="help-block" id="{{$field.0}}_tip" role="tooltip">{{$field.3 nofilter}}</span>
|
|
{{/if}}
|
|
<div id="end_{{$field.0}}" class="field_end"></div>
|
|
</div>
|