diff options
author | Reed Loden <reed@reedloden.com> | 2011-12-13 23:30:07 +0100 |
---|---|---|
committer | Reed Loden <reed@reedloden.com> | 2011-12-13 23:30:07 +0100 |
commit | a6aa75fc6f96527f01e8b4f0da414d9fa8ad8ce1 (patch) | |
tree | 4fd1b57b81d9467912099f4ac3b71fd9af0abd3a /createaccount.cgi | |
parent | 0133e0b65b1d73d87604b9f94b92c712206137e3 (diff) | |
download | bugzilla-a6aa75fc6f96527f01e8b4f0da414d9fa8ad8ce1.tar.gz bugzilla-a6aa75fc6f96527f01e8b4f0da414d9fa8ad8ce1.tar.xz |
Bug 705474 - CSRF vulnerability in createaccount.cgi allows possible unauthorized account creation e-mail request
[r=mkanat a=mkanat]
Diffstat (limited to 'createaccount.cgi')
-rwxr-xr-x | createaccount.cgi | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/createaccount.cgi b/createaccount.cgi index db0727add..2348d4e91 100755 --- a/createaccount.cgi +++ b/createaccount.cgi @@ -62,6 +62,11 @@ unless ($createexp) { my $login = $cgi->param('login'); if (defined($login)) { + # Check the hash token to make sure this user actually submitted + # the create account form. + my $token = $cgi->param('token'); + check_hash_token($token, ['create_account']); + $login = Bugzilla::User->check_login_name_for_creation($login); $vars->{'login'} = $login; |