Fix: Fixed possible stored CSRF vulnerabilities.
When displaying flash messages or link tooltips it was possible to perform stored CSRF attack by crafting malicious object properties (group name, filter name, etc.) (Redmine issue: #3443)
Showing
- lib/hawat/blueprints/dbstatus/__init__.py 18 additions, 18 deletionslib/hawat/blueprints/dbstatus/__init__.py
- lib/hawat/blueprints/events/__init__.py 12 additions, 3 deletionslib/hawat/blueprints/events/__init__.py
- lib/hawat/blueprints/filters/__init__.py 80 additions, 30 deletionslib/hawat/blueprints/filters/__init__.py
- lib/hawat/blueprints/groups/__init__.py 3 additions, 1 deletionlib/hawat/blueprints/groups/__init__.py
- lib/hawat/blueprints/networks/__init__.py 30 additions, 25 deletionslib/hawat/blueprints/networks/__init__.py
- lib/hawat/blueprints/reports/__init__.py 12 additions, 7 deletionslib/hawat/blueprints/reports/__init__.py
- lib/hawat/blueprints/settings_reporting/__init__.py 17 additions, 12 deletionslib/hawat/blueprints/settings_reporting/__init__.py
- lib/vial/blueprints/auth_api/__init__.py 6 additions, 6 deletionslib/vial/blueprints/auth_api/__init__.py
- lib/vial/blueprints/groups/__init__.py 54 additions, 47 deletionslib/vial/blueprints/groups/__init__.py
- lib/vial/blueprints/users/__init__.py 62 additions, 48 deletionslib/vial/blueprints/users/__init__.py
- lib/vial/view/__init__.py 18 additions, 9 deletionslib/vial/view/__init__.py
Loading
Please register or sign in to comment