diff options
author | lpsolit%gmail.com <> | 2006-04-07 07:17:40 +0200 |
---|---|---|
committer | lpsolit%gmail.com <> | 2006-04-07 07:17:40 +0200 |
commit | 6d348ff980d4483f0337750b7d3831b0b21da341 (patch) | |
tree | e9813214fd7a392677681fc631c6dbcbf3fdcfb6 /relogin.cgi | |
parent | 424ece4d8d183d74d7993023e2846a0724549315 (diff) | |
download | bugzilla-6d348ff980d4483f0337750b7d3831b0b21da341.tar.gz bugzilla-6d348ff980d4483f0337750b7d3831b0b21da341.tar.xz |
Bug 332906: Wrong parameters passed to sudo sessions when trying to bypass validation checks - Patch by Frédéric Buclin <LpSolit@gmail.com> r/a=justdave
Diffstat (limited to 'relogin.cgi')
-rwxr-xr-x | relogin.cgi | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/relogin.cgi b/relogin.cgi index 1aef30e10..0d772f9eb 100755 --- a/relogin.cgi +++ b/relogin.cgi @@ -121,8 +121,8 @@ elsif ($action eq 'begin-sudo') { && ($token_data eq 'sudo_prepared')) { ThrowUserError('sudo_preparation_required', - { target_login => $cgi->param('target_login'), - reason => $cgi->param('reason')}); + { target_login => scalar $cgi->param('target_login'), + reason => scalar $cgi->param('reason')}); } Bugzilla::Token::DeleteToken($cgi->param('token')); |