From 69ad536a55aaa58bfd4cb68578061dd5efe5b84d Mon Sep 17 00:00:00 2001 From: Dave Lawrence Date: Wed, 22 Feb 2012 10:38:20 -0500 Subject: Bug 725663 - (CVE-2012-0453) [SECURITY] CSRF vulnerability in the XML-RPC API when using mod_perl r/a=LpSolit --- template/en/default/global/user-error.html.tmpl | 5 +++++ 1 file changed, 5 insertions(+) (limited to 'template/en/default/global/user-error.html.tmpl') diff --git a/template/en/default/global/user-error.html.tmpl b/template/en/default/global/user-error.html.tmpl index 9e99dae15..feff9f042 100644 --- a/template/en/default/global/user-error.html.tmpl +++ b/template/en/default/global/user-error.html.tmpl @@ -1702,6 +1702,11 @@ <[% type FILTER html %]> field. (See the XML-RPC specification for details.) + [% ELSIF error == "xmlrpc_illegal_content_type" %] + When using XML-RPC, you cannot send data as + [%+ content_type FILTER html %]. Only text/xml + and application/xml are allowed. + [% ELSIF error == "zero_length_file" %] [% title = "File Is Empty" %] The file you are trying to attach is empty, does not exist, or you don't -- cgit v1.2.3-24-g4f1b