BUG 11072 XSS vulnerability SOLVED
- In the warning message the data sent are not correctly sanitized - Sanitize the data before send the message
This commit is contained in:
@@ -55,10 +55,10 @@ if ($userData['USR_EMAIL'] != '' && $userData['USR_EMAIL'] === $data['USR_EMAIL'
|
|||||||
|
|
||||||
G::LoadClass('spool');
|
G::LoadClass('spool');
|
||||||
$oSpool = new spoolRun();
|
$oSpool = new spoolRun();
|
||||||
if ($aSetup['MESS_RAUTH'] == false || (is_string($aSetup['MESS_RAUTH']) && $aSetup['MESS_RAUTH'] == 'false')) {
|
if ($aSetup['MESS_RAUTH'] == false || (is_string($aSetup['MESS_RAUTH']) && $aSetup['MESS_RAUTH'] == 'false')) {
|
||||||
$aSetup['MESS_RAUTH'] = 0;
|
$aSetup['MESS_RAUTH'] = 0;
|
||||||
} else {
|
} else {
|
||||||
$aSetup['MESS_RAUTH'] = 1;
|
$aSetup['MESS_RAUTH'] = 1;
|
||||||
}
|
}
|
||||||
$oSpool->setConfig( array(
|
$oSpool->setConfig( array(
|
||||||
'MESS_ENGINE' => $aSetup['MESS_ENGINE'],
|
'MESS_ENGINE' => $aSetup['MESS_ENGINE'],
|
||||||
@@ -115,7 +115,7 @@ if ($userData['USR_EMAIL'] != '' && $userData['USR_EMAIL'] === $data['USR_EMAIL'
|
|||||||
G::SendTemporalMessage ($e->getMessage(), "warning", 'string');
|
G::SendTemporalMessage ($e->getMessage(), "warning", 'string');
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
$msg = G::LoadTranslation('ID_USER') . ' ' . $data['USR_USERNAME'] . ' '. G::LoadTranslation('ID_IS_NOT_REGISTERED');
|
$msg = G::LoadTranslation('ID_USER') . ' ' . htmlentities($data['USR_USERNAME'], ENT_QUOTES, 'UTF-8') . ' '. G::LoadTranslation('ID_IS_NOT_REGISTERED');
|
||||||
G::SendTemporalMessage ($msg, "warning", 'string');
|
G::SendTemporalMessage ($msg, "warning", 'string');
|
||||||
G::header('location: forgotPassword');
|
G::header('location: forgotPassword');
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user