From 6d47c047f71c9e2293320ea5b8d94284a8e15939 Mon Sep 17 00:00:00 2001 From: Damien Regad Date: Sat, 27 Dec 2014 18:47:58 +0100 Subject: [PATCH] Fix XSS in install.php This vulnerability (CVE-2014-9571) was reported by High-Tech Bridge Security Research Lab (https://www.htbridge.com/) in issue #17937 (advisory ID HTB23243). The parameters are now properly sanitized before being displayed. Fixes #17938 --- admin/install.php | 42 +++++++++++++++++++++--------------------- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git a/admin/install.php b/admin/install.php index bc8d613da1..577a32d379 100644 --- a/admin/install.php +++ b/admin/install.php @@ -355,7 +355,7 @@ function print_test( $p_test_description, $p_result, $p_hard_fail = true, $p_mes # due to a bug in ADODB, this call prompts warnings, hence the @ # the check only works on mysql if the database is open $t_version_info = @$g_db->ServerInfo(); - echo '
Running ' . $f_db_type . ' version ' . $t_version_info['description']; + echo '
Running ' . string_attribute( $f_db_type ) . ' version ' . $t_version_info['description']; ?> - + - + - + if required) - + @@ -500,7 +500,7 @@ function print_test( $p_test_description, $p_result, $p_hard_fail = true, $p_mes Admin Password (to if required) - + @@ -754,13 +754,13 @@ function print_test( $p_test_description, $p_result, $p_hard_fail = true, $p_mes /** @todo to be written */ // must post data gathered to preserve it ?> - - - - - - - + + + + + + + Please correct failed checks - - - - - - - - + + + + + + + +