aurweb/web/template/stats/updates_table.php
Lukas Fleischer 6f6904db3f Fix some more XSS vulnerabilities
Escape strings properly using htmlspecialchars(). Seems like we missed
these in former cleanups. Fixes FS#28515.

Signed-off-by: Lukas Fleischer <archlinux@cryptocrack.de>
2012-02-19 04:48:31 +01:00

36 lines
935 B
PHP

<table class="boxSoft">
<tr>
<th colspan="2" class="boxSoftTitle" style="text-align: right">
<span class="f3"><?php print __("Recent Updates") ?><span class="f5"></span></span>
<a href="rss.php"><img src="images/feed-icon-14x14.png" alt="RSS Feed" /></a>
</th>
</tr>
<?php foreach ($newest_packages->getIterator() as $row): ?>
<tr>
<td class="boxSoft">
<span class="f4"><span class="blue">
<a href="packages.php?ID=<?php print intval($row["ID"]); ?>">
<?php print htmlspecialchars($row["Name"]) . ' ' . htmlspecialchars($row["Version"]); ?>
</a></span></span>
</td>
<td class="boxSoft">
<?php
$mod_int = intval($row["ModifiedTS"]);
$sub_int = intval($row["SubmittedTS"]);
if ($mod_int == $sub_int):
$modstring = '<img src="images/new.gif" alt="New!" /> ' . gmdate("r", $sub_int);
else:
$modstring = gmdate("r", $mod_int);
endif;
?>
<span class="f4"><?php print $modstring; ?></span>
</td>
</tr>
<?php endforeach; ?>
</table>