summaryrefslogtreecommitdiffstats
path: root/createaccount.cgi
diff options
context:
space:
mode:
authorReed Loden <reed@reedloden.com>2011-12-13 23:30:07 +0100
committerReed Loden <reed@reedloden.com>2011-12-13 23:30:07 +0100
commita6aa75fc6f96527f01e8b4f0da414d9fa8ad8ce1 (patch)
tree4fd1b57b81d9467912099f4ac3b71fd9af0abd3a /createaccount.cgi
parent0133e0b65b1d73d87604b9f94b92c712206137e3 (diff)
downloadbugzilla-a6aa75fc6f96527f01e8b4f0da414d9fa8ad8ce1.tar.gz
bugzilla-a6aa75fc6f96527f01e8b4f0da414d9fa8ad8ce1.tar.xz
Bug 705474 - CSRF vulnerability in createaccount.cgi allows possible unauthorized account creation e-mail request
[r=mkanat a=mkanat]
Diffstat (limited to 'createaccount.cgi')
-rwxr-xr-xcreateaccount.cgi5
1 files changed, 5 insertions, 0 deletions
diff --git a/createaccount.cgi b/createaccount.cgi
index db0727add..2348d4e91 100755
--- a/createaccount.cgi
+++ b/createaccount.cgi
@@ -62,6 +62,11 @@ unless ($createexp) {
my $login = $cgi->param('login');
if (defined($login)) {
+ # Check the hash token to make sure this user actually submitted
+ # the create account form.
+ my $token = $cgi->param('token');
+ check_hash_token($token, ['create_account']);
+
$login = Bugzilla::User->check_login_name_for_creation($login);
$vars->{'login'} = $login;