SOURCES: apache1-CVE-2005-3352.patch (NEW) - Cross-site scripting ...
glen
glen at pld-linux.org
Tue Feb 7 19:37:38 CET 2006
Author: glen Date: Tue Feb 7 18:37:38 2006 GMT
Module: SOURCES Tag: HEAD
---- Log message:
- Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev
---- Files affected:
SOURCES:
apache1-CVE-2005-3352.patch (NONE -> 1.1) (NEW)
---- Diffs:
================================================================
Index: SOURCES/apache1-CVE-2005-3352.patch
diff -u /dev/null SOURCES/apache1-CVE-2005-3352.patch:1.1
--- /dev/null Tue Feb 7 19:37:38 2006
+++ SOURCES/apache1-CVE-2005-3352.patch Tue Feb 7 19:37:33 2006
@@ -0,0 +1,37 @@
+Index: src/modules/standard/mod_imap.c
+===================================================================
+--- src/modules/standard/mod_imap.c (revision 330526)
++++ src/modules/standard/mod_imap.c (working copy)
+@@ -328,7 +328,7 @@
+ if (!strcasecmp(value, "referer")) {
+ referer = ap_table_get(r->headers_in, "Referer");
+ if (referer && *referer) {
+- return ap_pstrdup(r->pool, referer);
++ return ap_escape_html(r->pool, referer);
+ }
+ else {
+ /* XXX: This used to do *value = '\0'; ... which is totally bogus
+Index: src/main/util.c
+===================================================================
+--- src/main/util.c (revision 330526)
++++ src/main/util.c (working copy)
+@@ -1722,6 +1722,8 @@
+ j += 3;
+ else if (s[i] == '&')
+ j += 4;
++ else if (s[i] == '"')
++ j += 5;
+
+ if (j == 0)
+ return ap_pstrndup(p, s, i);
+@@ -1740,6 +1742,10 @@
+ memcpy(&x[j], "&", 5);
+ j += 4;
+ }
++ else if (s[i] == '"') {
++ memcpy(&x[j], """, 6);
++ j += 5;
++ }
+ else
+ x[j] = s[i];
+
================================================================
More information about the pld-cvs-commit
mailing list