summaryrefslogtreecommitdiffstats
path: root/query.cgi
diff options
context:
space:
mode:
authorReed Loden <reed@reedloden.com>2012-05-29 16:50:08 +0200
committerReed Loden <reed@reedloden.com>2012-05-29 16:50:08 +0200
commit19b514899d02fde1c53916fe0c0a364548c6ab8d (patch)
tree90e1c43a55d5ba19e7308b8f9a28cb44025a8009 /query.cgi
parenta196f9ce707424901a8d26262c441f56650784f8 (diff)
downloadbugzilla-19b514899d02fde1c53916fe0c0a364548c6ab8d.tar.gz
bugzilla-19b514899d02fde1c53916fe0c0a364548c6ab8d.tar.xz
Bug 754673 - CSRF vulnerability in query.cgi allows possible unauthorized use of "Set my default search back to the system default"
[r=LpSolit a=LpSolit]
Diffstat (limited to 'query.cgi')
-rwxr-xr-xquery.cgi3
1 files changed, 3 insertions, 0 deletions
diff --git a/query.cgi b/query.cgi
index 47be93125..df3d9cadf 100755
--- a/query.cgi
+++ b/query.cgi
@@ -20,6 +20,7 @@ use Bugzilla::Product;
use Bugzilla::Keyword;
use Bugzilla::Field;
use Bugzilla::Install::Util qw(vers_cmp);
+use Bugzilla::Token;
###############
# Subroutines #
@@ -72,6 +73,8 @@ my $userid = $user->id;
if ($cgi->param('nukedefaultquery')) {
if ($userid) {
+ my $token = $cgi->param('token');
+ check_hash_token($token, ['nukedefaultquery']);
$dbh->do("DELETE FROM namedqueries" .
" WHERE userid = ? AND name = ?",
undef, ($userid, DEFAULT_QUERY_NAME));