Headline
CVE-2023-0312: fix: added missing conversion to HTML entities · thorsten/phpMyFAQ@65d419c
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
@@ -7,12 +7,12 @@ * v. 2.0. If a copy of the MPL was not distributed with this file, You can * obtain one at http://mozilla.org/MPL/2.0/. * * @package phpMyFAQ * @author Thorsten Rinne [email protected] * @package phpMyFAQ * @author Thorsten Rinne [email protected] * @copyright 2002-2022 phpMyFAQ Team * @license http://www.mozilla.org/MPL/2.0/ Mozilla Public License Version 2.0 * @link https://www.phpmyfaq.de * @since 2002-09-16 * @license http://www.mozilla.org/MPL/2.0/ Mozilla Public License Version 2.0 * @link https://www.phpmyfaq.de * @since 2002-09-16 */
use phpMyFAQ\Captcha; @@ -63,7 +63,7 @@ $question = $readonly = '’; if (!is_null($selectedQuestion)) { $oQuestion = $questionObject->getQuestion($selectedQuestion); $question = $oQuestion[‘question’]; $question = Strings::htmlentities($oQuestion[‘question’]); if (Strings::strlen($question)) { $readonly = ' readonly’; }
Related news
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.