summaryrefslogtreecommitdiff
path: root/Mailman/Cgi/admin.py
diff options
context:
space:
mode:
authorbwarsaw2001-11-30 08:00:20 +0000
committerbwarsaw2001-11-30 08:00:20 +0000
commit2573211cd38281e3ff9c18be8babdc3d82371bd7 (patch)
tree2a883a62071a0b24ae7d997803cbf4ec2b6d2f93 /Mailman/Cgi/admin.py
parent85cb1112319965a77f5b6aff2d702d8740d5f855 (diff)
downloadmailman-2573211cd38281e3ff9c18be8babdc3d82371bd7.tar.gz
mailman-2573211cd38281e3ff9c18be8babdc3d82371bd7.tar.zst
mailman-2573211cd38281e3ff9c18be8babdc3d82371bd7.zip
Forward port security patch from Mailman 2.0.8:
Fixes to prevent cross-site scripting exploits. See http://www.cert.org/advisories/CA-2000-02.html Reported by zeno@cgisecurity.com Fix is to cgi.escape() any strings regurgitated from the url back to the browser in the html response.
Diffstat (limited to 'Mailman/Cgi/admin.py')
-rw-r--r--Mailman/Cgi/admin.py4
1 files changed, 3 insertions, 1 deletions
diff --git a/Mailman/Cgi/admin.py b/Mailman/Cgi/admin.py
index fcff2d755..3d7a80be4 100644
--- a/Mailman/Cgi/admin.py
+++ b/Mailman/Cgi/admin.py
@@ -61,7 +61,9 @@ def main():
try:
mlist = MailList.MailList(listname, lock=0)
except Errors.MMListError, e:
- admin_overview(_('No such list <em>%(listname)s</em>'))
+ # Avoid cross-site scripting attacks
+ safelistname = cgi.escape(listname)
+ admin_overview(_('No such list <em>%(safelistname)s</em>'))
syslog('error', 'admin.py access for non-existent list: %s',
listname)
return