Bug 842038: (CVE-2013-0785) [SECURITY] XSS in show_bug.cgi when using an invalid page format
r=glob a=LpSolit git-svn-id: svn://10.0.0.236/branches/BUGZILLA-3_6-BRANCH@264770 18797224-902f-48f8-a5cc-f745e15eee43
This commit is contained in:
parent
99d67a5552
commit
d9e31bb969
@ -1 +1 @@
|
||||
7310
|
||||
7311
|
||||
@ -128,6 +128,7 @@ sub get_format {
|
||||
return
|
||||
{
|
||||
'template' => $template,
|
||||
'format' => $format,
|
||||
'extension' => $ctype,
|
||||
'ctype' => Bugzilla::Constants::contenttypes->{$ctype}
|
||||
};
|
||||
|
||||
@ -37,9 +37,11 @@ my $vars = {};
|
||||
|
||||
my $user = Bugzilla->login();
|
||||
|
||||
my $format = $template->get_format("bug/show", scalar $cgi->param('format'),
|
||||
scalar $cgi->param('ctype'));
|
||||
|
||||
# Editable, 'single' HTML bugs are treated slightly specially in a few places
|
||||
my $single = !$cgi->param('format')
|
||||
&& (!$cgi->param('ctype') || $cgi->param('ctype') eq 'html');
|
||||
my $single = !$format->{format} && $format->{extension} eq 'html';
|
||||
|
||||
# If we don't have an ID, _AND_ we're only doing a single bug, then prompt
|
||||
if (!$cgi->param('id') && $single) {
|
||||
@ -49,9 +51,6 @@ if (!$cgi->param('id') && $single) {
|
||||
exit;
|
||||
}
|
||||
|
||||
my $format = $template->get_format("bug/show", scalar $cgi->param('format'),
|
||||
scalar $cgi->param('ctype'));
|
||||
|
||||
my @bugs = ();
|
||||
my %marks;
|
||||
|
||||
@ -125,5 +124,5 @@ $vars->{'displayfields'} = \%displayfields;
|
||||
|
||||
print $cgi->header($format->{'ctype'});
|
||||
|
||||
$template->process("$format->{'template'}", $vars)
|
||||
$template->process($format->{'template'}, $vars)
|
||||
|| ThrowTemplateError($template->error());
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user