We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 5c735f4 commit 0d91b9fCopy full SHA for 0d91b9f
releasenotes/notes/CVE-2019-13122-e9c63aa346ed15c2.yaml
@@ -0,0 +1,11 @@
1
+---
2
+fixes:
3
+ - |
4
+ CVE-2019-13122 has been fixed. Andrew Donnellan discovered an XSS
5
+ via the message-id field. A malicious user could send a patch with
6
+ a message ID that included a script tag. Because of the quirks of
7
+ the email RFCs, such a message ID can survive being sent through
8
+ many mail systems, including Gmail, and be parsed and stored by
9
+ Patchwork. When a user viewed a patch detail page for the patch
10
+ with this message id, the script would be run. This is fixed by
11
+ properly escaping the field before it is rendered.
0 commit comments