Fixed possible code injection incase session variables are compromised
This commit is contained in:
@@ -7,6 +7,7 @@ $HeadURL: https://phpmyadmin.svn.sourceforge.net/svnroot/phpmyadmin/trunk/phpMyA
|
||||
|
||||
3.3.10.2 (not yet released)
|
||||
- [security] Fixed possible session corruption in swekey authentication
|
||||
- [security] Fixed possible code injection incase session variables are compromised
|
||||
|
||||
3.3.10.1 (2011-05-20)
|
||||
- [security] XSS on Tracking page
|
||||
|
@@ -286,7 +286,7 @@ class ConfigFile
|
||||
if ($this->getServerCount() > 0) {
|
||||
$ret .= "/* Servers configuration */$crlf\$i = 0;" . $crlf . $crlf;
|
||||
foreach ($c['Servers'] as $id => $server) {
|
||||
$ret .= '/* Server: ' . strtr($this->getServerName($id), '*/', '-') . " [$id] */" . $crlf
|
||||
$ret .= '/* Server: ' . strtr($this->getServerName($id) . " [$id] ", '*/', '-') . "*/" . $crlf
|
||||
. '$i++;' . $crlf;
|
||||
foreach ($server as $k => $v) {
|
||||
$k = preg_replace('/[^A-Za-z0-9_]/', '_', $k);
|
||||
|
Reference in New Issue
Block a user