view website/issues/html/query.item.html @ 4851:24b8011cd2dc

Fix XSS in issue2550817 Note that the code that triggers that particular bug is no longer in roundup core. But the change to the templates we suggest is a *lot* safer as it always escapes the error and ok messages now. If you are upgrading: you *MUST* read doc/upgrading.txt and do the necessary changes to your templates, the escaping now happens in the template and not in the roundup code. So if you don't make the necessary changes *you are vulnerable*.
author Ralf Schlatterbeck <rsc@runtux.com>
date Fri, 20 Dec 2013 18:24:10 +0100
parents c2d0d3e9099d
children 578b5294e888
line wrap: on
line source

<!-- query.item -->
<span tal:replace="structure context/renderQueryForm" />


Roundup Issue Tracker: http://roundup-tracker.org/