view website/issues/html/msg.index.html @ 8062:28aa76443f58

fix(security): fix CVE-2024-39124, CVE-2024-39124, and CVE-2024-39125 Directions for fixing: * `CVE-2024-39124`_ - :ref:`classhelpers (_generic.help.html) are vulnerable to an XSS attack. <CVE-2024-39124>` Requires fixing tracker homes. * `CVE-2024-39125`_ - :ref:`if Referer header is set to a script tag, it will be executed. <CVE-2024-39125>` Fixed in release 2.4.0, directions available for fixing in prior versions. * `CVE-2024-39126`_ - :ref:`PDF, XML and SVG files downloaded from an issue can contain embedded JavaScript which is executed. <CVE-2024-39126>` Fixed in release 2.4.0, directions available for fixing in prior versions. prior to 2.4.0 release this weekend that fixes the last two CVE's.
author John Rouillard <rouilj@ieee.org>
date Tue, 09 Jul 2024 09:07:09 -0400
parents c2d0d3e9099d
children
line wrap: on
line source

<tal:block metal:use-macro="templates/page/macros/icing">
<title metal:fill-slot="head_title" i18n:translate=""
 >List of messages - <span tal:replace="config/TRACKER_NAME"
 i18n:name="tracker"/></title>
<span metal:fill-slot="body_title" tal:omit-tag="python:1"
 i18n:translate="">Message listing</span>
<td class="content" metal:fill-slot="content">
<table tal:define="batch request/batch" class="messages">
 <tr><th colspan=3 class="header" i18n:translate="">Messages</th></tr>
 <tal:block tal:repeat="msg batch">
  <tr>
   <th><a tal:attributes="href string:msg${msg/id}"><tal:x replace="msg/id"/></a></th>
   <th tal:content="string:Author: ${msg/author}">author</th>
   <th tal:content="string:Date: ${msg/date}">date</th>
  </tr>
  <tr>
   <td colspan="3"><pre tal:content="msg/content">content</pre></td>
  </tr>
 </tal:block>

 <metal:block use-macro="templates/issue.index/macros/batch-footer" />

</table>
</td>

</tal:block>

Roundup Issue Tracker: http://roundup-tracker.org/