/[smecontribs]/rpms/mailman/contribs7/mailman-2.1-CVE-2006-3636.patch
ViewVC logotype

Annotation of /rpms/mailman/contribs7/mailman-2.1-CVE-2006-3636.patch

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph


Revision 1.3 - (hide annotations) (download)
Tue Nov 25 16:20:13 2008 UTC (15 years, 11 months ago) by slords
Branch: MAIN
CVS Tags: HEAD
Changes since 1.2: +0 -0 lines
Restore

1 slords 1.1 --- mailman-2.1.5.1/Mailman/Cgi/admindb.py.CVE-2006-3636 2004-04-30 18:50:42.000000000 +0200
2     +++ mailman-2.1.5.1/Mailman/Cgi/admindb.py 2006-08-23 12:24:06.000000000 +0200
3     @@ -310,7 +310,7 @@
4     ' ' + _('Permanently ban from this list')
5     # While the address may be a unicode, it must be ascii
6     paddr = addr.encode('us-ascii', 'replace')
7     - table.AddRow(['%s<br><em>%s</em>' % (paddr, fullname),
8     + table.AddRow(['%s<br><em>%s</em>' % (paddr, Utils.websafe(fullname)),
9     radio,
10     TextBox('comment-%d' % id, size=40)
11     ])
12     @@ -354,7 +354,7 @@
13     mlist.HandleRequest(id, mm_cfg.DISCARD)
14     continue
15     num += 1
16     - table.AddRow(['%s<br><em>%s</em>' % (addr, fullname),
17     + table.AddRow(['%s<br><em>%s</em>' % (addr, Utils.websafe(fullname)),
18     RadioButtonArray(id, (_('Defer'),
19     _('Approve'),
20     _('Reject'),
21     --- mailman-2.1.5.1/Mailman/Cgi/create.py.CVE-2006-3636 2004-02-29 18:07:51.000000000 +0100
22     +++ mailman-2.1.5.1/Mailman/Cgi/create.py 2006-08-23 12:24:06.000000000 +0200
23     @@ -187,15 +187,24 @@
24     mlist.Create(listname, owner, pw, langs, emailhost)
25     finally:
26     os.umask(oldmask)
27     - except Errors.EmailAddressError, s:
28     + except Errors.EmailAddressError, e:
29     + if e.args:
30     + s = Utils.websafe(e.args[0])
31     + else:
32     + s = Utils.websafe(owner)
33     request_creation(doc, cgidata,
34     _('Bad owner email address: %(s)s'))
35     return
36     except Errors.MMListAlreadyExistsError:
37     + # MAS: List already exists so we don't need to websafe it.
38     request_creation(doc, cgidata,
39     _('List already exists: %(listname)s'))
40     return
41     - except Errors.BadListNameError, s:
42     + except Errors.BadListNameError, e:
43     + if e.args:
44     + s = Utils.websafe(e.args[0])
45     + else:
46     + s = Utils.websafe(listname)
47     request_creation(doc, cgidata,
48     _('Illegal list name: %(s)s'))
49     return
50     @@ -318,15 +327,17 @@
51     ftable.AddRow([Center(Italic(_('List Identity')))])
52     ftable.AddCellInfo(ftable.GetCurrentRowIndex(), 0, colspan=2)
53    
54     - safelistname = Utils.websafe(cgidata.getvalue('listname', ''))
55     + listname = cgidata.getvalue('listname', '')
56     + # MAS: Don't websafe twice. TextBox does it.
57     ftable.AddRow([Label(_('Name of list:')),
58     - TextBox('listname', safelistname)])
59     + TextBox('listname', listname)])
60     ftable.AddCellInfo(ftable.GetCurrentRowIndex(), 0, bgcolor=GREY)
61     ftable.AddCellInfo(ftable.GetCurrentRowIndex(), 1, bgcolor=GREY)
62    
63     - safeowner = Utils.websafe(cgidata.getvalue('owner', ''))
64     + owner = cgidata.getvalue('owner', '')
65     + # MAS: Don't websafe twice. TextBox does it.
66     ftable.AddRow([Label(_('Initial list owner address:')),
67     - TextBox('owner', safeowner)])
68     + TextBox('owner', owner)])
69     ftable.AddCellInfo(ftable.GetCurrentRowIndex(), 0, bgcolor=GREY)
70     ftable.AddCellInfo(ftable.GetCurrentRowIndex(), 1, bgcolor=GREY)
71    
72     --- mailman-2.1.5.1/Mailman/Cgi/options.py.CVE-2006-3636 2004-02-29 17:45:27.000000000 +0100
73     +++ mailman-2.1.5.1/Mailman/Cgi/options.py 2006-08-23 12:24:06.000000000 +0200
74     @@ -652,7 +652,7 @@
75    
76     fullname = Utils.uncanonstr(mlist.getMemberName(user), userlang)
77     if fullname:
78     - presentable_user += ', %s' % fullname
79     + presentable_user += ', %s' % Utils.websafe(fullname)
80    
81     # Do replacements
82     replacements = mlist.GetStandardReplacements(userlang)
83     --- mailman-2.1.5.1/Mailman/Cgi/edithtml.py.CVE-2006-3636 2002-05-22 05:00:18.000000000 +0200
84     +++ mailman-2.1.5.1/Mailman/Cgi/edithtml.py 2006-08-23 12:24:06.000000000 +0200
85     @@ -140,7 +140,8 @@
86     doc.AddItem('<p>')
87     doc.AddItem('<hr>')
88     form = Form(mlist.GetScriptURL('edithtml') + '/' + template_name)
89     - text = Utils.websafe(Utils.maketext(template_name, raw=1, mlist=mlist))
90     + text = Utils.maketext(template_name, raw=1, mlist=mlist)
91     + # MAS: Don't websafe twice. TextArea does it.
92     form.AddItem(TextArea('html_code', text, rows=40, cols=75))
93     form.AddItem('<p>' + _('When you are done making changes...'))
94     form.AddItem(SubmitButton('submit', _('Submit Changes')))
95     --- mailman-2.1.5.1/Mailman/Cgi/admin.py.CVE-2006-3636 2003-12-24 18:27:45.000000000 +0100
96     +++ mailman-2.1.5.1/Mailman/Cgi/admin.py 2006-08-23 12:25:48.000000000 +0200
97     @@ -1319,6 +1319,7 @@
98     # we display. Try uploading a file with 10k names -- it takes a while
99     # to render the status page.
100     for entry in entries:
101     + safeentry = Utils.websafe(entry)
102     fullname, address = parseaddr(entry)
103     # Canonicalize the full name
104     fullname = Utils.canonstr(fullname, mlist.preferred_language)
105     @@ -1336,17 +1337,17 @@
106     send_admin_notif, invitation,
107     whence='admin mass sub')
108     except Errors.MMAlreadyAMember:
109     - subscribe_errors.append((entry, _('Already a member')))
110     + subscribe_errors.append((safeentry, _('Already a member')))
111     except Errors.MMBadEmailError:
112     if userdesc.address == '':
113     subscribe_errors.append((_('&lt;blank line&gt;'),
114     _('Bad/Invalid email address')))
115     else:
116     - subscribe_errors.append((entry,
117     + subscribe_errors.append((safeentry,
118     _('Bad/Invalid email address')))
119     except Errors.MMHostileAddress:
120     subscribe_errors.append(
121     - (entry, _('Hostile address (illegal characters)')))
122     + (safeentry, _('Hostile address (illegal characters)')))
123     else:
124     member = Utils.uncanonstr(formataddr((fullname, address)))
125     subscribe_success.append(Utils.websafe(member))
126     @@ -1386,9 +1387,9 @@
127     addr, whence='admin mass unsub',
128     admin_notif=send_unsub_notifications,
129     userack=userack)
130     - unsubscribe_success.append(addr)
131     + unsubscribe_success.append(Utils.websafe(addr))
132     except Errors.NotAMemberError:
133     - unsubscribe_errors.append(addr)
134     + unsubscribe_errors.append(Utils.websafe(addr))
135     if unsubscribe_success:
136     doc.AddItem(Header(5, _('Successfully Unsubscribed:')))
137     doc.AddItem(UnorderedList(*unsubscribe_success))
138     --- mailman-2.1.5.1/Mailman/Utils.py.CVE-2006-3636 2003-12-26 23:50:04.000000000 +0100
139     +++ mailman-2.1.5.1/Mailman/Utils.py 2006-08-23 12:24:06.000000000 +0200
140     @@ -201,7 +201,7 @@
141     _badchars = re.compile(r'[][()<>|;^,/\200-\377]')
142    
143     def ValidateEmail(s):
144     - """Verify that the an email address isn't grossly evil."""
145     + """Verify that an email address isn't grossly evil."""
146     # Pretty minimal, cheesy check. We could do better...
147     if not s or s.count(' ') > 0:
148     raise Errors.MMBadEmailError
149     --- mailman-2.1.5.1/Mailman/htmlformat.py.CVE-2006-3636 2003-09-22 04:58:13.000000000 +0200
150     +++ mailman-2.1.5.1/Mailman/htmlformat.py 2006-08-23 12:24:06.000000000 +0200
151     @@ -448,7 +448,11 @@
152    
153     class TextBox(InputObj):
154     def __init__(self, name, value='', size=mm_cfg.TEXTFIELDWIDTH):
155     - InputObj.__init__(self, name, "TEXT", value, checked=0, size=size)
156     + if isinstance(value, str):
157     + safevalue = Utils.websafe(value)
158     + else:
159     + safevalue = value
160     + InputObj.__init__(self, name, "TEXT", safevalue, checked=0, size=size)
161    
162     class Hidden(InputObj):
163     def __init__(self, name, value=''):
164     @@ -457,8 +461,12 @@
165     class TextArea:
166     def __init__(self, name, text='', rows=None, cols=None, wrap='soft',
167     readonly=0):
168     + if isinstance(text, str):
169     + safetext = Utils.websafe(text)
170     + else:
171     + safetext = text
172     self.name = name
173     - self.text = text
174     + self.text = safetext
175     self.rows = rows
176     self.cols = cols
177     self.wrap = wrap
178     --- mailman-2.1.5.1/Mailman/Gui/General.py.CVE-2006-3636 2004-02-17 20:27:46.000000000 +0100
179     +++ mailman-2.1.5.1/Mailman/Gui/General.py 2006-08-23 12:24:06.000000000 +0200
180     @@ -433,13 +433,13 @@
181     GUIBase._setValue(self, mlist, property, val, doc)
182    
183     def _escape(self, property, value):
184     - # The 'info' property allows HTML, but lets sanitize it to avoid XSS
185     + # The 'info' property allows HTML, but let's sanitize it to avoid XSS
186     # exploits. Everything else should be fully escaped.
187     if property <> 'info':
188     return GUIBase._escape(self, property, value)
189     # Sanitize <script> and </script> tags but nothing else. Not the best
190     # solution, but expedient.
191     - return re.sub(r'<([/]?script.*?)>', r'&lt;\1&gt;', value)
192     + return re.sub(r'(?i)<([/]?script.*?)>', r'&lt;\1&gt;', value)
193    
194     def _postValidate(self, mlist, doc):
195     if not mlist.reply_to_address.strip() and \
196     --- mailman-2.1.5.1/Mailman/HTMLFormatter.py.CVE-2006-3636 2003-09-29 17:01:22.000000000 +0200
197     +++ mailman-2.1.5.1/Mailman/HTMLFormatter.py 2006-08-23 12:24:06.000000000 +0200
198     @@ -332,8 +332,12 @@
199     return '</FORM>'
200    
201     def FormatBox(self, name, size=20, value=''):
202     + if isinstance(value, str):
203     + safevalue = Utils.websafe(value)
204     + else:
205     + safevalue = value
206     return '<INPUT type="Text" name="%s" size="%d" value="%s">' % (
207     - name, size, value)
208     + name, size, safevalue)
209    
210     def FormatSecureBox(self, name):
211     return '<INPUT type="Password" name="%s" size="15">' % name

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed