Headline
CVE-2014-125034: Updated view.php · stiiv/contact_app@67bec33
A vulnerability has been found in stiiv contact_app and classified as problematic. Affected by this vulnerability is the function render of the file libs/View.php. The manipulation of the argument var leads to cross site scripting. The attack can be launched remotely. The name of the patch is 67bec33f559da9d41a1b45eb9e992bd8683a7f8c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217183.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
* Explore
* All features
* Documentation
* GitHub Skills
* Blog
For
Enterprise
Teams
Startups
Education
By Solution
CI/CD & Automation
DevOps
DevSecOps
Case Studies
Customer Stories
Resources
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
* Repositories
* Topics
* Trending
* Collections
Pricing
Notifications
Fork 1
Code
Issues 1
Pull requests
Actions
Projects
Wiki
Security
Insights
Permalink
Browse files
Updated view.php
I put htmlspecialchars() into the var_check to avoid the XSS injection.
- Loading branch information
1 parent f9e5169 commit 67bec33f559da9d41a1b45eb9e992bd8683a7f8c
Showing 1 changed file with 3 additions and 2 deletions.
@@ -43,7 +43,8 @@ public function render($template, $noInclude = false) {
* @return string
*/
public function var_check(&$var) {
return isset($var) ? $var : '’;
return isset($var) ? htmlspecialchars($var,ENT_QUOTES,’UTF-8’) : '’;
//I put htmlspecialchars into the var_check to avoid the XSS injection.
}
}
}
0 comments on commit 67bec33
Please sign in to comment.