diff options
| author | Reed Loden <reed@reedloden.com> | 2011-01-24 10:12:00 -0800 |
|---|---|---|
| committer | Reed Loden <reed@reedloden.com> | 2011-01-24 10:12:00 -0800 |
| commit | 38eeecf6362b6dc17718c84a35dbbaea7cc15ccd (patch) | |
| tree | 5c5153c1f757917bd75e573ecea4d02f62616f52 | |
| parent | 078c49317674c5d62135deff544a0b72a4546cdf (diff) | |
| download | bugs-38eeecf6362b6dc17718c84a35dbbaea7cc15ccd.tar bugs-38eeecf6362b6dc17718c84a35dbbaea7cc15ccd.tar.gz bugs-38eeecf6362b6dc17718c84a35dbbaea7cc15ccd.tar.bz2 bugs-38eeecf6362b6dc17718c84a35dbbaea7cc15ccd.tar.xz bugs-38eeecf6362b6dc17718c84a35dbbaea7cc15ccd.zip | |
Bug 621572: (CVE-2010-4572) [SECURITY] chart.cgi vulnerable to header-injection due to use of |print "Location:"| instead of $cgi->redirect
[r=mkanat a=LpSolit]
| -rwxr-xr-x | chart.cgi | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -74,8 +74,8 @@ if (!Bugzilla->feature('new_charts')) { # Go back to query.cgi if we are adding a boolean chart parameter. if (grep(/^cmd-/, $cgi->param())) { my $params = $cgi->canonicalise_query("format", "ctype", "action"); - print "Location: query.cgi?format=" . $cgi->param('query_format') . - ($params ? "&$params" : "") . "\n\n"; + print $cgi->redirect("query.cgi?format=" . $cgi->param('query_format') . + ($params ? "&$params" : "")); exit; } @@ -98,7 +98,7 @@ $action ||= "assemble"; # Go to buglist.cgi if we are doing a search. if ($action eq "search") { my $params = $cgi->canonicalise_query("format", "ctype", "action"); - print "Location: buglist.cgi" . ($params ? "?$params" : "") . "\n\n"; + print $cgi->redirect("buglist.cgi" . ($params ? "?$params" : "")); exit; } |
