summaryrefslogtreecommitdiffstats
path: root/relogin.cgi
diff options
context:
space:
mode:
authorlpsolit%gmail.com <>2006-04-07 07:17:40 +0200
committerlpsolit%gmail.com <>2006-04-07 07:17:40 +0200
commit6d348ff980d4483f0337750b7d3831b0b21da341 (patch)
treee9813214fd7a392677681fc631c6dbcbf3fdcfb6 /relogin.cgi
parent424ece4d8d183d74d7993023e2846a0724549315 (diff)
downloadbugzilla-6d348ff980d4483f0337750b7d3831b0b21da341.tar.gz
bugzilla-6d348ff980d4483f0337750b7d3831b0b21da341.tar.xz
Bug 332906: Wrong parameters passed to sudo sessions when trying to bypass validation checks - Patch by Frédéric Buclin <LpSolit@gmail.com> r/a=justdave
Diffstat (limited to 'relogin.cgi')
-rwxr-xr-xrelogin.cgi4
1 files changed, 2 insertions, 2 deletions
diff --git a/relogin.cgi b/relogin.cgi
index 1aef30e10..0d772f9eb 100755
--- a/relogin.cgi
+++ b/relogin.cgi
@@ -121,8 +121,8 @@ elsif ($action eq 'begin-sudo') {
&& ($token_data eq 'sudo_prepared'))
{
ThrowUserError('sudo_preparation_required',
- { target_login => $cgi->param('target_login'),
- reason => $cgi->param('reason')});
+ { target_login => scalar $cgi->param('target_login'),
+ reason => scalar $cgi->param('reason')});
}
Bugzilla::Token::DeleteToken($cgi->param('token'));