diff options
author | Peder Bergebakken Sundt <pbsds@hotmail.com> | 2022-07-23 05:45:24 +0200 |
---|---|---|
committer | Peder Bergebakken Sundt <pbsds@hotmail.com> | 2022-07-23 05:45:24 +0200 |
commit | d23282a2f559ff4860e2b58e210cc7779c65d1ee (patch) | |
tree | 286369c76df4c8aa745e987510bacb489ffa64be /pkgs/servers/rainloop/fix-cve-2022-29360.patch | |
parent | 3556174c299888c8daa44afef34e9242fe257ad1 (diff) |
rainloop-{community,standard}: patch CVE-2022-29360
Diffstat (limited to 'pkgs/servers/rainloop/fix-cve-2022-29360.patch')
-rw-r--r-- | pkgs/servers/rainloop/fix-cve-2022-29360.patch | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/pkgs/servers/rainloop/fix-cve-2022-29360.patch b/pkgs/servers/rainloop/fix-cve-2022-29360.patch new file mode 100644 index 0000000000000..5ee7ad1103d6e --- /dev/null +++ b/pkgs/servers/rainloop/fix-cve-2022-29360.patch @@ -0,0 +1,23 @@ +Fetched from https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/ + +--- a/rainloop/rainloop/v/1.16.0/app/libraries/MailSo/Base/HtmlUtils.php ++++ b/rainloop/rainloop/v/1.16.0/app/libraries/MailSo/Base/HtmlUtils.php +@@ -239,7 +239,8 @@ class HtmlUtils + $oWrapHtml->setAttribute($sKey, $sValue); + } + +- $oWrapDom = $oDom->createElement('div', '___xxx___'); ++ $rand_str = base64_encode(random_bytes(32)); ++ $oWrapDom = $oDom->createElement('div', $rand_str); + $oWrapDom->setAttribute('data-x-div-type', 'body'); + foreach ($aBodylAttrs as $sKey => $sValue) + { +@@ -250,7 +251,7 @@ class HtmlUtils + + $sWrp = $oDom->saveHTML($oWrapHtml); + +- $sResult = \str_replace('___xxx___', $sResult, $sWrp); ++ $sResult = \str_replace($rand_str, $sResult, $sWrp); + } + + $sResult = \str_replace(\MailSo\Base\HtmlUtils::$KOS, ':', $sResult); |