Bugzilla – Attachment 40437 Details for
Bug 94579
VUL-0: CVE-2005-1921: php XML RPC code injection
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
IDP Log In
|
Forgot Password
[patch]
RPC.php.diff
RPC.php.diff (text/plain), 1.18 KB, created by
Marcus Meissner
on 2005-06-29 15:19:40 UTC
(
hide
)
Description:
RPC.php.diff
Filename:
MIME Type:
Creator:
Marcus Meissner
Created:
2005-06-29 15:19:40 UTC
Size:
1.18 KB
patch
obsolete
>--- RPC.php.orig 2005-06-13 21:25:55.000000000 +0200 >+++ RPC.php 2005-06-29 13:57:59.983211416 +0200 >@@ -237,7 +237,7 @@ > break; > > case 'NAME': >- $XML_RPC_xh[$parser]['st'] .= "'"; >+ $XML_RPC_xh[$parser]['st'] .= '"'; > $XML_RPC_xh[$parser]['ac'] = ''; > break; > >@@ -320,7 +320,7 @@ > break; > > case 'NAME': >- $XML_RPC_xh[$parser]['st'] .= $XML_RPC_xh[$parser]['ac'] . "' => "; >+ $XML_RPC_xh[$parser]['st'] .= $XML_RPC_xh[$parser]['ac'] . '" => '; > break; > > case 'BOOLEAN': >@@ -345,8 +345,8 @@ > // we use double quotes rather than single so backslashification works OK > $XML_RPC_xh[$parser]['st'] .= '"' . $XML_RPC_xh[$parser]['ac'] . '"'; > } elseif ($XML_RPC_xh[$parser]['qt'] == 2) { >- $XML_RPC_xh[$parser]['st'] .= "base64_decode('" >- . $XML_RPC_xh[$parser]['ac'] . "')"; >+ $XML_RPC_xh[$parser]['st'] .= 'base64_decode("' >+ . $XML_RPC_xh[$parser]['ac'] . '")'; > } elseif ($name == 'BOOLEAN') { > $XML_RPC_xh[$parser]['st'] .= $XML_RPC_xh[$parser]['ac']; > } else {
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
Actions:
View
|
Diff
Attachments on
bug 94579
: 40437 |
41293