In my computer science class, my professor provided the following example...
Normally, a user would provide a link by typing the following in chatroom...
[Example Website](https://example.com)
And receive a output of...
Example Website
(highlighted in blue and click-able)
However, if the input was modified to...
_[Example_Website](https://example.com)_
Then the output would be...
Example</em><span class="copyonly">_</span>Website_
(with the blue clickable link ending after the e in website, but before the last _)
My task was to attempt to figure a ways to exploit this, but im quite lost on how to do so. Ive attempted to add in more as follows...
_[Example_Website](https://example.com/>"><script>alert("XSS")</script>&)_
Which resulted in...
Example</em><span class="copyonly">_</span>Website</script>&)_
(blue clickable link now ending after the e in Website)
I noticed some of my code disappeared, does that mean it was executed on the remote server? Is there any other simple test that should be used against this to find out if its exploitable?