Name |
Last commit
|
Last update |
---|---|---|
.. | ||
__init__.py | ||
test_json_request.py | ||
test_memcache.py | ||
test_request.py | ||
test_sandboxing.py | ||
test_string_utils.py | ||
test_submit_feedback.py |
Several templates used a variable set by the user (the request host header). This led to a vulnerability where an attacker could inject their domain name into these templates (i.e., activation emails). This patch fixes this vulnerability. LMS-532
Name |
Last commit
|
Last update |
---|---|---|
.. | ||
__init__.py | Loading commit data... | |
test_json_request.py | Loading commit data... | |
test_memcache.py | Loading commit data... | |
test_request.py | Loading commit data... | |
test_sandboxing.py | Loading commit data... | |
test_string_utils.py | Loading commit data... | |
test_submit_feedback.py | Loading commit data... |