| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| __init__.py | ||
| test_json_request.py | ||
| test_memcache.py | ||
| test_request.py | ||
| test_sandboxing.py | ||
| test_string_utils.py | ||
| test_submit_feedback.py |
Several templates used a variable set by the user (the request host header). This led to a vulnerability where an attacker could inject their domain name into these templates (i.e., activation emails). This patch fixes this vulnerability. LMS-532
| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| __init__.py | Loading commit data... | |
| test_json_request.py | Loading commit data... | |
| test_memcache.py | Loading commit data... | |
| test_request.py | Loading commit data... | |
| test_sandboxing.py | Loading commit data... | |
| test_string_utils.py | Loading commit data... | |
| test_submit_feedback.py | Loading commit data... |