aboutsummaryrefslogtreecommitdiff
path: root/devel/viewvc/files
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2004-12-08 10:50:38 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2004-12-08 10:50:38 +0000
commitc4371e60ede3627dc4ed3c4d6fefbaf3c20b068d (patch)
treeb22f105147d033f29c32dbcba1fcd2ac134f68f3 /devel/viewvc/files
parentc46101db22a15cd6cb17c876a511e34e9b34cdfd (diff)
downloadports-c4371e60ede3627dc4ed3c4d6fefbaf3c20b068d.tar.gz
ports-c4371e60ede3627dc4ed3c4d6fefbaf3c20b068d.zip
Fix information leakage security vulnerability.
VuXML: http://vuxml.FreeBSD.org/323784cf-48a6-11d9-a9e7-0001020eed82.html Approved by: nectar Obtained from: Debian
Notes
Notes: svn path=/head/; revision=123452
Diffstat (limited to 'devel/viewvc/files')
-rw-r--r--devel/viewvc/files/patch-CAN-2004-091537
1 files changed, 37 insertions, 0 deletions
diff --git a/devel/viewvc/files/patch-CAN-2004-0915 b/devel/viewvc/files/patch-CAN-2004-0915
new file mode 100644
index 000000000000..6e150bc53438
--- /dev/null
+++ b/devel/viewvc/files/patch-CAN-2004-0915
@@ -0,0 +1,37 @@
+--- lib/viewcvs.py.orig 2004-10-20 15:03:41.000000000 +0200
++++ lib/viewcvs.py 2004-10-20 16:37:35.000000000 +0200
+@@ -2455,10 +2455,17 @@ def generate_tarball_header(out, name, s
+ def generate_tarball(out, relative, directory, tag, stack=[]):
+ subdirs = [ ]
+ rcs_files = [ ]
++ if relative == 'CVSROOT' and cfg.options.hide_cvsroot:
++ return
++
+ for file, pathname, isdir in get_file_data(directory):
+ if pathname == _UNREADABLE_MARKER:
+ continue
+ if isdir:
++ if file == 'CVSROOT' and relative.find('/') == -1 and cfg.options.hide_cvsroot:
++ continue
++ if relative.find('/') == -1 and cfg.is_forbidden(file):
++ continue
+ subdirs.append(file)
+ else:
+ rcs_files.append(file)
+@@ -2583,6 +2590,16 @@ def main():
+ '</body></html>\n')
+ return
+
++ if where == 'CVSROOT' and cfg.options.hide_cvsroot:
++ print "Status: 400"
++ http_header()
++ print ('<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n'
++ '<html><head>\n<title>400 Bad Request</title>\n'
++ '</head><body>\n'
++ '<H1>Bad Request</H1>\n Listing of CVSROOT is disallowed.<p>\n'
++ '</body></html>\n')
++ return
++
+ ### look for GZIP binary
+
+ # if we have a directory and the request didn't end in "/", then redirect