mirror of
https://github.com/friendica/friendica
synced 2024-11-18 17:03:41 +00:00
6f9e15ea57
- This could allow code injection from a malicious query leading to a form page - Thanks to Laura Pîrcălăboiu for the report
8 lines
484 B
Smarty
8 lines
484 B
Smarty
<div id="id_{{$field.0}}_wrapper" class="form-group field input openid">
|
|
<label for="id_{{$field.0}}" id="label_{{$field.0}}">{{$field.1}}</label>
|
|
<input class="form-control" name="{{$field.0}}" id="id_{{$field.0}}" type="text" value="{{$field.2}}" {{if $field.4}} readonly="readonly" {{/if}} aria-describedby="{{$field.0}}_tip">
|
|
{{if $field.3}}
|
|
<span class="help-block" id="{{$field.0}}_tip" role="tooltip">{{$field.3 nofilter}}</span>
|
|
{{/if}}
|
|
<div class="clear"></div>
|
|
</div>
|