summaryrefslogtreecommitdiff
path: root/www-apps/websvn/files/30_CVE-2016-2511.patch
diff options
context:
space:
mode:
authorV3n3RiX <venerix@koprulu.sector>2021-12-22 14:08:05 +0000
committerV3n3RiX <venerix@koprulu.sector>2021-12-22 14:08:05 +0000
commit93a93e9a3b53c1a73142a305ea1f8136846942ee (patch)
treeb9791a06ab3284e27b568412c59316c66240c682 /www-apps/websvn/files/30_CVE-2016-2511.patch
parent2771f79232c273bc2a57d23bf335dd81ccf6af28 (diff)
gentoo resync : 22.12.2021
Diffstat (limited to 'www-apps/websvn/files/30_CVE-2016-2511.patch')
-rw-r--r--www-apps/websvn/files/30_CVE-2016-2511.patch11
1 files changed, 0 insertions, 11 deletions
diff --git a/www-apps/websvn/files/30_CVE-2016-2511.patch b/www-apps/websvn/files/30_CVE-2016-2511.patch
deleted file mode 100644
index 9c270bbc4582..000000000000
--- a/www-apps/websvn/files/30_CVE-2016-2511.patch
+++ /dev/null
@@ -1,11 +0,0 @@
---- orig/include/setup.php 2016-02-19 16:02:05.674756241 +0100
-+++ new/include/setup.php 2016-02-19 16:02:10.166832543 +0100
-@@ -467,7 +467,7 @@
- $vars['validationurl'] = getFullURL($_SERVER['SCRIPT_NAME']).'?'.buildQuery($queryParams + array('template' => $template, 'language' => $language), '%26');
-
- // To avoid a possible XSS exploit, need to clean up the passed-in path first
--$path = !empty($_REQUEST['path']) ? $_REQUEST['path'] : null;
-+$path = !empty($_REQUEST['path']) ? escape($_REQUEST['path']) : null;
- if ($path === null || $path === '')
- $path = '/';
- $vars['safepath'] = escape($path);