aboutsummaryrefslogtreecommitdiffstats
path: root/Mailman/Cgi/edithtml.py
diff options
context:
space:
mode:
authorMark Sapiro <mark@msapiro.net>2021-11-30 09:50:49 -0800
committerMark Sapiro <mark@msapiro.net>2021-11-30 09:50:49 -0800
commita306294cf9e4d4a4ded2c840f9a1ce8ba412b6a7 (patch)
tree9f8f2843bf72bc8cfabe4d752eb7914e535d8f08 /Mailman/Cgi/edithtml.py
parentf63f8d81d718d779dd6cdb55c66bf3def0fe9041 (diff)
downloadmailman2-a306294cf9e4d4a4ded2c840f9a1ce8ba412b6a7.tar.gz
mailman2-a306294cf9e4d4a4ded2c840f9a1ce8ba412b6a7.tar.xz
mailman2-a306294cf9e4d4a4ded2c840f9a1ce8ba412b6a7.zip
Block CSRF attack against admin or admindb pages.
Diffstat (limited to 'Mailman/Cgi/edithtml.py')
-rw-r--r--Mailman/Cgi/edithtml.py3
1 files changed, 2 insertions, 1 deletions
diff --git a/Mailman/Cgi/edithtml.py b/Mailman/Cgi/edithtml.py
index 1dd9e87b..170e8116 100644
--- a/Mailman/Cgi/edithtml.py
+++ b/Mailman/Cgi/edithtml.py
@@ -111,7 +111,8 @@ def main():
safe_params = ['VARHELP', 'adminpw', 'admlogin']
params = cgidata.keys()
if set(params) - set(safe_params):
- csrf_checked = csrf_check(mlist, cgidata.getfirst('csrf_token'))
+ csrf_checked = csrf_check(mlist, cgidata.getfirst('csrf_token'),
+ 'admin')
else:
csrf_checked = True
# if password is present, void cookie to force password authentication.