[SECURITY] XSS in be_layout wizard
Usage of unverified input parameters in wizard URL leads to a possible XSS vulnerability in backend_layout wizard. The solution is the introduction of a hmac validation of the parameters used in JavaScript. Change-Id: I48f89309fc062d132e283d4fd9179ccbfdcfda4c Fixes: #36768 Releases: 6.2, 6.1, 6.0, 4.7, 4.5 Security-Commit: a3ac48f5d66c566d241295d87cc8d7eb4d10c274 Security-Bulletin: TYPO3-CORE-SA-2013-004 Reviewed-on: https://review.typo3.org/26219 Reviewed-by: Oliver Hader Tested-by: Oliver Hader
Please register or sign in to comment