about summary refs log tree commit diff
path: root/pkgs/servers/rainloop/fix-cve-2022-29360.patch
diff options
context:
space:
mode:
authorPeder Bergebakken Sundt <pbsds@hotmail.com>2022-07-23 05:45:24 +0200
committerPeder Bergebakken Sundt <pbsds@hotmail.com>2022-07-23 05:45:24 +0200
commitd23282a2f559ff4860e2b58e210cc7779c65d1ee (patch)
tree286369c76df4c8aa745e987510bacb489ffa64be /pkgs/servers/rainloop/fix-cve-2022-29360.patch
parent3556174c299888c8daa44afef34e9242fe257ad1 (diff)
rainloop-{community,standard}: patch CVE-2022-29360
Diffstat (limited to 'pkgs/servers/rainloop/fix-cve-2022-29360.patch')
-rw-r--r--pkgs/servers/rainloop/fix-cve-2022-29360.patch23
1 files changed, 23 insertions, 0 deletions
diff --git a/pkgs/servers/rainloop/fix-cve-2022-29360.patch b/pkgs/servers/rainloop/fix-cve-2022-29360.patch
new file mode 100644
index 0000000000000..5ee7ad1103d6e
--- /dev/null
+++ b/pkgs/servers/rainloop/fix-cve-2022-29360.patch
@@ -0,0 +1,23 @@
+Fetched from https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/
+
+--- a/rainloop/rainloop/v/1.16.0/app/libraries/MailSo/Base/HtmlUtils.php
++++ b/rainloop/rainloop/v/1.16.0/app/libraries/MailSo/Base/HtmlUtils.php
+@@ -239,7 +239,8 @@ class HtmlUtils
+ 				$oWrapHtml->setAttribute($sKey, $sValue);
+ 			}
+ 
+-			$oWrapDom = $oDom->createElement('div', '___xxx___');
++			$rand_str = base64_encode(random_bytes(32));
++			$oWrapDom = $oDom->createElement('div', $rand_str);
+ 			$oWrapDom->setAttribute('data-x-div-type', 'body');
+ 			foreach ($aBodylAttrs as $sKey => $sValue)
+ 			{
+@@ -250,7 +251,7 @@ class HtmlUtils
+ 
+ 			$sWrp = $oDom->saveHTML($oWrapHtml);
+ 
+-			$sResult = \str_replace('___xxx___', $sResult, $sWrp);
++			$sResult = \str_replace($rand_str, $sResult, $sWrp);
+ 		}
+ 
+ 		$sResult = \str_replace(\MailSo\Base\HtmlUtils::$KOS, ':', $sResult);