Skip to content

Commit 0d91b9f

Browse files
committed
docs: Add a release note for CVE-2019-13122
Signed-off-by: Daniel Axtens <[email protected]> (cherry picked from commit f48179f) Signed-off-by: Daniel Axtens <[email protected]>
1 parent 5c735f4 commit 0d91b9f

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
fixes:
3+
- |
4+
CVE-2019-13122 has been fixed. Andrew Donnellan discovered an XSS
5+
via the message-id field. A malicious user could send a patch with
6+
a message ID that included a script tag. Because of the quirks of
7+
the email RFCs, such a message ID can survive being sent through
8+
many mail systems, including Gmail, and be parsed and stored by
9+
Patchwork. When a user viewed a patch detail page for the patch
10+
with this message id, the script would be run. This is fixed by
11+
properly escaping the field before it is rendered.

0 commit comments

Comments
 (0)