summaryrefslogtreecommitdiff
path: root/releasenotes/notes/CVE-2019-13122-e9c63aa346ed15c2.yaml
blob: 8b2a9c3df5343173c02974b3801bf1c82f360c9a (plain)
1
2
3
4
5
6
7
8
9
10
11
---
fixes:
  - |
    CVE-2019-13122 has been fixed. Andrew Donnellan discovered an XSS
    via the message-id field. A malicious user could send a patch with
    a message ID that included a script tag. Because of the quirks of
    the email RFCs, such a message ID can survive being sent through
    many mail systems, including Gmail, and be parsed and stored by
    Patchwork. When a user viewed a patch detail page for the patch
    with this message id, the script would be run. This is fixed by
    properly escaping the field before it is rendered.