The existing patch is correct - using htmlspecialchars will have the
effect of placing escaped stings in the database. It will also have
the effect of double escaping each time you edit a field.

My patch replaces the display template method block() which does not
escape with the text() method which uses htmlspecialchars internally.
See /ipplan/layout/class.layout

As for the length check. This was a potential, unrelated database
overflow I discovered during investigation of the xss issue - totally
unrelated.

As for the CSRF issue. Its so specific, too hard to fix (I might be
wrong here), requires admin rights with which you could delete a user
anyway and will potentially never get used in an application that has
such a focus and small user base. So this issue is not fixed.

I have checked the rest of IPplan and am fairly convinced that there
are no other block method issues. I will check again. Note that the
usermanager component was written by another developer (not me), thus
the potential for these types of issues.

2009/6/23 Steffen Joeris <steffen.joe...@skolelinux.de>:
> Hi Richard
>
> I am not sure about your patch.
> Setting a maximum length does not fix a potential xss issue. Why not using
> htmlspecialchars() to take care of escaping? I have attached a potential patch
> for that. Of course, it would be good to check the rest of the code as well
> and see whether it is prone to xss issues.
> Also, as far as I understand it, the CSRF issue is very constructed and
> doesn't offer an attack vendor without having admin rights already, correct? I
> have to admit that I don't understand that part of your patch there.
>
> Cheers
> Steffen
>



-- 
Richard Ellerbrock



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to