Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2014-125034: Updated view.php · stiiv/contact_app@67bec33

A vulnerability has been found in stiiv contact_app and classified as problematic. Affected by this vulnerability is the function render of the file libs/View.php. The manipulation of the argument var leads to cross site scripting. The attack can be launched remotely. The name of the patch is 67bec33f559da9d41a1b45eb9e992bd8683a7f8c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217183.

CVE
#xss#vulnerability#git#php

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

*   Explore
*   All features
*   Documentation
*   GitHub Skills
*   Blog
    • For

    • Enterprise

    • Teams

    • Startups

    • Education

    • By Solution

    • CI/CD & Automation

    • DevOps

    • DevSecOps

    • Case Studies

    • Customer Stories

    • Resources

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

*   Repositories
*   Topics
*   Trending
*   Collections
  • Pricing

  • Notifications

  • Fork 1

  • Code

  • Issues 1

  • Pull requests

  • Actions

  • Projects

  • Wiki

  • Security

  • Insights

Permalink

Browse files

Updated view.php

I put htmlspecialchars() into the var_check to avoid the XSS injection.

  • Loading branch information

1 parent f9e5169 commit 67bec33f559da9d41a1b45eb9e992bd8683a7f8c

Showing 1 changed file with 3 additions and 2 deletions.

@@ -43,7 +43,8 @@ public function render($template, $noInclude = false) {

* @return string

*/

public function var_check(&$var) {

return isset($var) ? $var : '’;

return isset($var) ? htmlspecialchars($var,ENT_QUOTES,’UTF-8’) : '’;

//I put htmlspecialchars into the var_check to avoid the XSS injection.

}

}

}

0 comments on commit 67bec33

Please sign in to comment.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda