зеркало из https://github.com/mozilla/pjs.git
sanitycheck.cgi was able to be run by anybody - even people without Bugzilla accounts. It is now restricted to only people with the editbugs permission (bug 54556).
Patch by Myk Melez <myk@mozilla.org> r= jake@acutex.net
This commit is contained in:
Родитель
48fe3c9399
Коммит
7e84b3b87a
|
@ -27,10 +27,25 @@ require "CGI.pl";
|
|||
|
||||
use vars %::FORM;
|
||||
|
||||
ConnectToDatabase();
|
||||
|
||||
confirm_login();
|
||||
|
||||
# Make sure the user is authorized to access sanitycheck.cgi. Access
|
||||
# is restricted to logged-in users who have "editbugs" privileges,
|
||||
# which is a reasonable compromise between allowing all users to access
|
||||
# the script (creating the potential for denial of service attacks)
|
||||
# and restricting access to this installation's administrators (which
|
||||
# prevents users with a legitimate interest in Bugzilla integrity
|
||||
# from accessing the script).
|
||||
UserInGroup("editbugs")
|
||||
|| DisplayError("You are not authorized to access this script,
|
||||
which is reserved for users with the ability to edit bugs.")
|
||||
&& exit;
|
||||
|
||||
print "Content-type: text/html\n";
|
||||
print "\n";
|
||||
|
||||
ConnectToDatabase();
|
||||
SendSQL("set SQL_BIG_TABLES=1");
|
||||
|
||||
my $offervotecacherebuild = 0;
|
||||
|
|
Загрузка…
Ссылка в новой задаче