зеркало из https://github.com/mozilla/pjs.git
[SECURITY] Bug 219044: A user with 'editkeywords' privileges (i.e. usually an administrator) can inject arbitrary SQL via the URL used to edit an existing keyword.
Patch by Joel Peshkin <bugreport@peshkin.net> r= justdave, zach a= justdave
This commit is contained in:
Родитель
d2043e034b
Коммит
d9b7ed995f
|
@ -126,6 +126,7 @@ unless (UserInGroup("editkeywords")) {
|
|||
|
||||
|
||||
my $action = trim($::FORM{action} || '');
|
||||
detaint_natural($::FORM{id});
|
||||
|
||||
|
||||
if ($action eq "") {
|
||||
|
|
Загрузка…
Ссылка в новой задаче