Skip to content

Commit

Permalink
issue2550711 Fix XSS vulnerability in @action parameter.
Browse files Browse the repository at this point in the history
thanks to "om" for reporting.
Also fix issue number of previous change-entry.
  • Loading branch information
schlatterbeck committed Jan 5, 2012
1 parent 38193cc commit ea29de3
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 2 deletions.
4 changes: 3 additions & 1 deletion CHANGES.txt
Original file line number Diff line number Diff line change
Expand Up @@ -55,8 +55,10 @@ Fixed:
backported version of my proposed changes to
email.header.decode_header in http://bugs.python.org/issue1079
(Ralf)
- issue2550711 Fix XSS vulnerability when username contains HTML code,
- issue2550684 Fix XSS vulnerability when username contains HTML code,
thanks to Thomas Arendsen Hein for reporting and patch.
- issue2550711 Fix XSS vulnerability in @action parameter,
thanks to "om" for reporting.


2011-07-15: 1.4.19
Expand Down
1 change: 1 addition & 0 deletions doc/acknowledgements.txt
Original file line number Diff line number Diff line change
Expand Up @@ -104,6 +104,7 @@ Stefan Niederhauser,
Truls E. Næss,
Bryce L Nordgren,
Patrick Ohly,
"om",
Luke Opperman,
Eddie Parker,
Will Partain,
Expand Down
2 changes: 1 addition & 1 deletion roundup/cgi/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -1171,7 +1171,7 @@ def get_action_class(self, action_name):
if name == action_name:
break
else:
raise ValueError('No such action "%s"'%action_name)
raise ValueError('No such action "%s"'%cgi.escape(action_name))
return action_klass

def _socket_op(self, call, *args, **kwargs):
Expand Down

0 comments on commit ea29de3

Please sign in to comment.