mirror of
https://gitlab.archlinux.org/archlinux/aurweb.git
synced 2025-02-03 10:43:03 +01:00
Checks are in place to avoid users getting account editing forms they shouldn't have access to. The appropriate checks before editing the account in the backend are not in place. This vulnerability allows a user to craft malicious POST data to edit other user accounts, thereby allowing account hijacking. Add a new flexible function can_edit_account() to determine if a user has appropriate permissions. Run the permission check before processing any account information in the backend. Signed-off-by: canyonknight <canyonknight@gmail.com> Signed-off-by: Lukas Fleischer <archlinux@cryptocrack.de> |
||
---|---|---|
.. | ||
Archive | ||
acctfuncs.inc.php | ||
aur.inc.php | ||
aurjson.class.php | ||
cachefuncs.inc.php | ||
config.inc.php.proto | ||
feedcreator.class.php | ||
gettext.php | ||
pkgfuncs.inc.php | ||
routing.inc.php | ||
stats.inc.php | ||
streams.php | ||
translator.inc.php | ||
version.inc.php |