From: Frédéric Buclin Date: Mon, 9 Jan 2012 23:51:48 +0000 (+0100) Subject: Bug 716283: Clickjacking in the attachment "Details" page allows to bypass token... X-Git-Tag: bugzilla-4.3.1~141 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=e7fb5b6ba75cc488d5fa155593546244334dec23;p=thirdparty%2Fbugzilla.git Bug 716283: Clickjacking in the attachment "Details" page allows to bypass token checks r=dkl a=LpSolit --- diff --git a/template/en/default/attachment/edit.html.tmpl b/template/en/default/attachment/edit.html.tmpl index a078141a2c..d637e37d19 100644 --- a/template/en/default/attachment/edit.html.tmpl +++ b/template/en/default/attachment/edit.html.tmpl @@ -195,6 +195,16 @@ [% END %]

+ [% ELSIF attachment.contenttype == "text/html" %] + [%# For security reasons (clickjacking, embedded scripts), we never + # render HTML pages from here. The source code is displayed instead. %] + [% INCLUDE global/textarea.html.tmpl + id = 'viewFrame' + minrows = 10 + cols = 80 + defaultcontent = attachment.data + readonly = 'readonly' + %] [% ELSE %]