Applied security patches by Kees Cook (Ubuntu) + little visual enhancements
7 files modified
1 files added
| | |
| | | CHANGELOG RoundCube Webmail |
| | | --------------------------- |
| | | |
| | | 2006/12/22 (thomasb) |
| | | ---------- |
| | | - Applied security patch to validate the submitted host value (by Kees Cook) |
| | | - Applied security patch to validate input values when deleting contacts (by Kees Cook) |
| | | - Applied security patch that sanitizes emoticon paths when attaching them (by Kees Cook) |
| | | - Applied a patch to more aggressively sanitize a HTML message |
| | | - Visualize blocked images in HTML messages |
| | | |
| | | |
| | | 2006/12/20 (thomasb) |
| | | ---------- |
| | | - Fixed wrong message listing when showing search results (closes #1484131) |
| | |
| | | if (!$host) |
| | | $host = $CONFIG['default_host']; |
| | | |
| | | // Validate that selected host is in the list of configured hosts |
| | | if (is_array($CONFIG['default_host'])) |
| | | { |
| | | $allowed = FALSE; |
| | | foreach ($CONFIG['default_host'] as $key => $host_allowed) |
| | | { |
| | | if (!is_numeric($key)) |
| | | $host_allowed = $key; |
| | | if ($host == $host_allowed) |
| | | { |
| | | $allowed = TRUE; |
| | | break; |
| | | } |
| | | } |
| | | if (!$allowed) |
| | | return FALSE; |
| | | } |
| | | else if (!empty($CONFIG['default_host']) && $host != $CONFIG['default_host']) |
| | | return FALSE; |
| | | |
| | | // parse $host URL |
| | | $a_host = parse_url($host); |
| | | if ($a_host['host']) |
| | |
| | | |
| | | $REMOTE_REQUEST = TRUE; |
| | | |
| | | if ($_GET['_cid']) |
| | | if ($_GET['_cid'] && preg_match('/^[0-9]+(,[0-9]+)*$/',$_GET['_cid'])) |
| | | { |
| | | $DB->query("UPDATE ".get_table_name('contacts')." |
| | | SET del=1 |
| | |
| | | } |
| | | |
| | | exit; |
| | | ?> |
| | | ?> |
| | |
| | | '/url\s*\(["\']?([\.\/]+[^"\'\s]+)["\']?\)/i', |
| | | '/<script.+<\/script>/Umis'); |
| | | |
| | | $remote_replaces = array('<img \\1src=\\2./program/blank.gif\\4', |
| | | $remote_replaces = array('<img \\1src=\\2./program/blocked.gif\\4', |
| | | '', |
| | | '', |
| | | '', |
| | |
| | | } |
| | | |
| | | // replace event handlers on any object |
| | | $body = preg_replace('/\s(on[a-z]+)=/im', ' __removed=', $body); |
| | | $body = preg_replace('/\s(on[^=]+)=/im', ' __removed=', $body); |
| | | $body = preg_replace('/\shref=["\']?(javascript:)/im', 'null:', $body); |
| | | |
| | | // resolve <base href> |
| | | $base_reg = '/(<base.*href=["\']?)([hftps]{3,5}:\/{2}[^"\'\s]+)([^<]*>)/i'; |
| | |
| | | if (stristr((string)$attrib['href'], 'mailto:')) |
| | | $attrib['onclick'] = sprintf("return %s.command('compose','%s',this)", |
| | | $GLOBALS['JS_OBJECT_NAME'], |
| | | substr($attrib['href'], 7)); |
| | | JQ(substr($attrib['href'], 7))); |
| | | else if (!empty($attrib['href']) && $attrib['href']{0}!='#') |
| | | $attrib['target'] = '_blank'; |
| | | |
| | |
| | | $image_name = substr($body, |
| | | $pos + strlen($searchstr), |
| | | $pos2 - ($pos + strlen($searchstr))); |
| | | // sanitize image name so resulting attachment doesn't leave images dir |
| | | $image_name = preg_replace('/[^a-zA-Z0-9_\.\-]/i','',$image_name); |
| | | |
| | | $body_post = substr($body, $pos2); |
| | | |
| | |
| | | |
| | | $REMOTE_REQUEST = $_GET['_remote'] ? TRUE : FALSE; |
| | | |
| | | if ($_GET['_iid']) |
| | | if ($_GET['_iid'] && preg_match('/^[0-9]+(,[0-9]+)*$/',$_GET['_iid'])) |
| | | { |
| | | $DB->query("UPDATE ".get_table_name('identities')." |
| | | SET del=1 |
| | |
| | | |
| | | // overwrite action variable |
| | | $OUTPUT->add_script(sprintf("\n%s.set_env('action', '%s');", $JS_OBJECT_NAME, $_action)); |
| | | ?> |
| | | ?> |
| | |
| | | |
| | | #messagepartframe |
| | | { |
| | | position: absolute; |
| | | top: 0px; |
| | | left: 0px; |
| | | right: 0px; |
| | | bottom: 0px; |
| | | width: auto; |
| | | height: auto; |
| | | border: 1px solid #999999; |
| | | background-color: #F9F9F9; |
| | | background-color: #F9F9F9; |
| | | } |
| | | |
| | | |