From: Frédéric Buclin
Date: Mon, 9 Jan 2012 23:51:48 +0000 (+0100)
Subject: Bug 716283: Clickjacking in the attachment "Details" page allows to bypass token...
X-Git-Tag: bugzilla-4.3.1~141
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=e7fb5b6ba75cc488d5fa155593546244334dec23;p=thirdparty%2Fbugzilla.git
Bug 716283: Clickjacking in the attachment "Details" page allows to bypass token checks
r=dkl a=LpSolit
---
diff --git a/template/en/default/attachment/edit.html.tmpl b/template/en/default/attachment/edit.html.tmpl
index a078141a2c..d637e37d19 100644
--- a/template/en/default/attachment/edit.html.tmpl
+++ b/template/en/default/attachment/edit.html.tmpl
@@ -195,6 +195,16 @@
[% END %]
+ [% ELSIF attachment.contenttype == "text/html" %]
+ [%# For security reasons (clickjacking, embedded scripts), we never
+ # render HTML pages from here. The source code is displayed instead. %]
+ [% INCLUDE global/textarea.html.tmpl
+ id = 'viewFrame'
+ minrows = 10
+ cols = 80
+ defaultcontent = attachment.data
+ readonly = 'readonly'
+ %]
[% ELSE %]