Skip to content

Commit ea29de3

Browse files
committed
issue2550711 Fix XSS vulnerability in @action parameter.
thanks to "om" for reporting. Also fix issue number of previous change-entry.
1 parent 38193cc commit ea29de3

File tree

3 files changed

+5
-2
lines changed

3 files changed

+5
-2
lines changed

CHANGES.txt

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,10 @@ Fixed:
5555
backported version of my proposed changes to
5656
email.header.decode_header in http://bugs.python.org/issue1079
5757
(Ralf)
58-
- issue2550711 Fix XSS vulnerability when username contains HTML code,
58+
- issue2550684 Fix XSS vulnerability when username contains HTML code,
5959
thanks to Thomas Arendsen Hein for reporting and patch.
60+
- issue2550711 Fix XSS vulnerability in @action parameter,
61+
thanks to "om" for reporting.
6062

6163

6264
2011-07-15: 1.4.19

doc/acknowledgements.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,7 @@ Stefan Niederhauser,
104104
Truls E. Næss,
105105
Bryce L Nordgren,
106106
Patrick Ohly,
107+
"om",
107108
Luke Opperman,
108109
Eddie Parker,
109110
Will Partain,

roundup/cgi/client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1171,7 +1171,7 @@ def get_action_class(self, action_name):
11711171
if name == action_name:
11721172
break
11731173
else:
1174-
raise ValueError('No such action "%s"'%action_name)
1174+
raise ValueError('No such action "%s"'%cgi.escape(action_name))
11751175
return action_klass
11761176

11771177
def _socket_op(self, call, *args, **kwargs):

0 commit comments

Comments
 (0)