From: jake%acutex.net <> Date: Fri, 1 Jun 2001 20:38:01 +0000 (+0000) Subject: More leak pluggin. This one fixes bug 39526. X-Git-Tag: bugzilla-2.14~109 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=8e1f344a2b52856dde0ac23b05244d3a3e7bf66e;p=thirdparty%2Fbugzilla.git More leak pluggin. This one fixes bug 39526. Patch by Myk Melez r= jake@acutex.net --- diff --git a/show_activity.cgi b/show_activity.cgi index d6e388afc1..fccc21cd4b 100755 --- a/show_activity.cgi +++ b/show_activity.cgi @@ -19,21 +19,40 @@ # Rights Reserved. # # Contributor(s): Terry Weissman +# Myk Melez use diagnostics; use strict; require "CGI.pl"; +ConnectToDatabase(); + +###################################################################### +# Begin Data/Security Validation +###################################################################### + +# Check whether or not the user is currently logged in. This function +# sets the value of $::usergroupset, the binary number that records +# the set of groups to which the user belongs and which we can use +# to determine whether or not the user is authorized to access this bug. +quietly_check_login(); + +# Make sure the bug ID is a positive integer representing an existing +# bug that the user is authorized to access. +ValidateBugID($::FORM{'id'}); + +###################################################################### +# End Data/Security Validation +###################################################################### + print "Content-type: text/html\n\n"; PutHeader("Changes made to bug $::FORM{'id'}", "Activity log", "Bug $::FORM{'id'}"); -ConnectToDatabase(); - DumpBugActivity($::FORM{'id'}); -print "
Back to bug $::FORM{'id'}\n"; +print qq|
Back to bug $::FORM{'id'}\n|; PutFooter();