summaryrefslogtreecommitdiff
path: root/doku.php
diff options
context:
space:
mode:
authorAndreas Gohr <gohr@cosmocode.de>2012-04-19 11:26:46 +0200
committerAdrian Lang <mail@adrianlang.de>2012-04-19 12:12:24 +0200
commit8da915a3b9ee2964f2b44527334c0a6c30506beb (patch)
tree9f51c2aa3bc4ba4faf4a8e8f1279ecf673c4ce0a /doku.php
parent2aff50250d74adb1b4567753ec0a4515f0529495 (diff)
downloadrpg-8da915a3b9ee2964f2b44527334c0a6c30506beb.tar.gz
rpg-8da915a3b9ee2964f2b44527334c0a6c30506beb.tar.bz2
escape target error message (SECURITY) FS#2487 FS#2488
The error message when a non-existant editor was tried to load wasn't escaped correctly, allowing to introduce arbitrary JavaScript to the output, leading to a XSS vulnerability. Note: the reported second XCRF vulnerability is the same bug, the xploit code simply uses JavaScript to extract a valid CSRF token from the site
Diffstat (limited to 'doku.php')
0 files changed, 0 insertions, 0 deletions