From 2a7e0c300ac71332790060bc7b2595db5500ce7c Mon Sep 17 00:00:00 2001 From: Natanael Copa Date: Tue, 22 Aug 2017 19:12:30 +0000 Subject: main/phpldapadmin: secfix for CVE-2017-11107 fixes #7510 --- community/phpldapadmin/CVE-2017-11107.patch | 31 +++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 community/phpldapadmin/CVE-2017-11107.patch (limited to 'community/phpldapadmin/CVE-2017-11107.patch') diff --git a/community/phpldapadmin/CVE-2017-11107.patch b/community/phpldapadmin/CVE-2017-11107.patch new file mode 100644 index 0000000000..f161d0e46a --- /dev/null +++ b/community/phpldapadmin/CVE-2017-11107.patch @@ -0,0 +1,31 @@ +Description: Fix multiple Cross-Site Scripting vulnerabilities in file htdocs/entry_chooser.php. +Author: Ismail Belkacim +Bug-Ubuntu: https://bugs.launchpad.net/bugs/1701731 +--- +This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ +Index: phpldapadmin-1.2.2/htdocs/entry_chooser.php +=================================================================== +--- phpldapadmin-1.2.2.orig/htdocs/entry_chooser.php ++++ phpldapadmin-1.2.2/htdocs/entry_chooser.php +@@ -15,9 +15,9 @@ $www['page'] = new page(); + + $request = array(); + $request['container'] = get_request('container','GET'); +-$request['form'] = get_request('form','GET'); +-$request['element'] = get_request('element','GET'); +-$request['rdn'] = get_request('rdn','GET'); ++$request['form'] = htmlspecialchars(addslashes(get_request('form','GET'))); ++$request['element'] = htmlspecialchars(addslashes(get_request('element','GET'))); ++$request['rdn'] = htmlspecialchars(addslashes(get_request('rdn','GET'))); + + echo '