Skip to content

Commit

Permalink
Fix #16513: XSS in account_sponsor_page.php project names
Browse files Browse the repository at this point in the history
account_sponsor_page.php.php does not correctly sanitise project
names. It is thus possible for a malicious user with project
manager access permissions (or higher) to let users execute
malicious JavaScript when visiting account_sponsor_page.php.
  • Loading branch information
atrol committed Oct 19, 2013
1 parent b8b4134 commit 0002d10
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions account_sponsor_page.php
Expand Up @@ -180,7 +180,7 @@

echo '<tr class="' . $status_label . '">';
echo '<td><a href="' . string_get_bug_view_url( $row['bug'] ) . '">' . bug_format_id( $row['bug'] ) . '</a></td>';
echo '<td>' . project_get_field( $t_bug->project_id, 'name' ) . '&#160;</td>';
echo '<td>' . string_display_line( project_get_field( $t_bug->project_id, 'name' ) ) . '&#160;</td>';
echo '<td class="right">' . $t_released_label . '&#160;</td>';
echo '<td><span class="issue-status" title="' . $t_resolution . '">' . $t_status . '</span></td>';
echo '<td>';
Expand Down Expand Up @@ -299,7 +299,7 @@

echo '<tr class="' . $status_label . '">';
echo '<td><a href="' . string_get_bug_view_url( $row['bug'] ) . '">' . bug_format_id( $row['bug'] ) . '</a></td>';
echo '<td>' . project_get_field( $t_bug->project_id, 'name' ) . '&#160;</td>';
echo '<td>' . string_display_line( project_get_field( $t_bug->project_id, 'name' ) ) . '&#160;</td>';
echo '<td class="right">' . $t_released_label . '&#160;</td>';
echo '<td><a title="' . $t_resolution . '"><span class="underline">' . $t_status . '</span>&#160;</a></td>';

Expand Down

0 comments on commit 0002d10

Please sign in to comment.