$NetBSD: patch-am,v 1.2 2020/09/07 10:34:52 mef Exp $ Fix various cross site scripting, arbitrary command execution and various other vulnerabilities in webmin (CVE-2008-0720). --- mysql/search_form.cgi.orig 2007-09-21 23:26:42.000000000 +0200 +++ mysql/search_form.cgi @@ -12,7 +12,8 @@ require './view-lib.pl'; &can_edit_db($in{'db'}) || &error($text{'dbase_ecannot'}); @str = &table_structure($in{'db'}, $in{'table'}); -$desc = &text('table_header', "$in{'table'}", "$in{'db'}"); +$desc = &text('table_header', "" . &html_escape($in{'table'}) . + "", "" . &html_escape($in{'db'}) . ""); &ui_print_header($desc, $text{'adv_title'}, ""); print &ui_form_start("view_table.cgi", "post"); @@ -36,13 +37,13 @@ print "\n"; print &ui_form_end([ [ "advanced", $text{'adv_ok'} ] ]); if ($access{'edonly'}) { - &ui_print_footer("edit_dbase.cgi?db=$in{'db'}",$text{'dbase_return'}, - "", $text{'index_return'}); + &ui_print_footer("edit_dbase.cgi?db=" . &urlize($in{'db'}), + $text{'dbase_return'}, "", $text{'index_return'}); } else { - &ui_print_footer("edit_table.cgi?db=$in{'db'}&table=$in{'table'}", - $text{'table_return'}, - "edit_dbase.cgi?db=$in{'db'}", $text{'dbase_return'}, - "", $text{'index_return'}); + &ui_print_footer("edit_table.cgi?db=" . &urlize($in{'db'}) . + "&table=" . &urlize($in{'table'}), $text{'table_return'}, + "edit_dbase.cgi?db=" . &urlize($in{'db'}), + $text{'dbase_return'}, "", $text{'index_return'}); }