| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| tests | ||
| __init__.py | ||
| cache.py | ||
| json_request.py | ||
| memcache.py | ||
| models.py | ||
| request.py | ||
| sandboxing.py | ||
| string_utils.py | ||
| testing.py | ||
| views.py |
Several templates used a variable set by the user (the request host header). This led to a vulnerability where an attacker could inject their domain name into these templates (i.e., activation emails). This patch fixes this vulnerability. LMS-532
| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| tests | Loading commit data... | |
| __init__.py | Loading commit data... | |
| cache.py | Loading commit data... | |
| json_request.py | Loading commit data... | |
| memcache.py | Loading commit data... | |
| models.py | Loading commit data... | |
| request.py | Loading commit data... | |
| sandboxing.py | Loading commit data... | |
| string_utils.py | Loading commit data... | |
| testing.py | Loading commit data... | |
| views.py | Loading commit data... |