]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
Hmmm. Once patched, silly that this would hang around :)
authorWilliam A. Rowe Jr <wrowe@apache.org>
Wed, 12 Dec 2007 19:45:15 +0000 (19:45 +0000)
committerWilliam A. Rowe Jr <wrowe@apache.org>
Wed, 12 Dec 2007 19:45:15 +0000 (19:45 +0000)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.0.x@603713 13f79535-47bb-0310-9956-ffa450edef68

CHANGES
STATUS
modules/http/http_protocol.c

diff --git a/CHANGES b/CHANGES
index f383f48231b16ca6614b90815d4b15cb46040b97..e4abefce18aa4555b42adbc9579b2f718614c9ea 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -5,6 +5,10 @@ Changes with Apache 2.0.62
      mod_imagemap: Fix a cross-site scripting issue.  Reported by JPCERT.
      [Joe Orton]  
 
+  *) http_protocol: Escape request method in 413 error reporting.
+     Determined to be not generally exploitable, but a flaw in any case.
+     PR 44014 [Victor Stinner <victor.stinner inl.fr>]
+
 Changes with Apache 2.0.61
 
   *) SECURITY: CVE-2007-3847 (cve.mitre.org)
diff --git a/STATUS b/STATUS
index 09429b0b383f254f0f6b71ab129f99689a548ce1..348e4ed05107c4e269a76c0e358bfc48531db50c 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -137,12 +137,7 @@ RELEASE SHOWSTOPPERS:
 PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
   [ start all new proposals below, under PATCHES PROPOSED. ]
 
-  * SECURITY: mod_imagemap: fix XSS issue (CVE-2007-5000)
-     Trunk version of patch:
-        http://svn.apache.org/viewvc?rev=603282&view=rev
-     Backport version for 2.0.x of patch:
-        http://people.apache.org/~jorton/2.0.x-CVE-2007-5000.diff
-    +1: jorton, rpluem, trawick
+
 
 PATCHES PROPOSED TO BACKPORT FROM TRUNK:
   [ please place SVN revisions from trunk here, so it is easy to
index d773045c224026f0b362e608a5e6d8945d424e33..d521842b7b68f8ba5815d3aa2f08c672b3214069 100644 (file)
@@ -2200,7 +2200,7 @@ static const char *get_canned_error_string(int status,
     case HTTP_LENGTH_REQUIRED:
         s1 = apr_pstrcat(p,
                          "<p>A request of the requested method ",
-                         r->method,
+                         ap_escape_html(r->pool, r->method),
                          " requires a valid Content-length.<br />\n",
                          NULL);
         return(add_optional_notes(r, s1, "error-notes", "</p>\n"));
@@ -2247,7 +2247,7 @@ static const char *get_canned_error_string(int status,
                            "The requested resource<br />",
                            ap_escape_html(r->pool, r->uri), "<br />\n",
                            "does not allow request data with ",
-                           r->method,
+                           ap_escape_html(r->pool, r->method),
                            " requests, or the amount of data provided in\n"
                            "the request exceeds the capacity limit.\n",
                            NULL));