File fix-CVE-2021-32718.patch of Package rabbitmq-server.38523
From 5d15ffc5ebfd9818fae488fc05d1f120ab02703c Mon Sep 17 00:00:00 2001
From: Michael Klishin <michael@clojurewerkz.org>
Date: Thu, 6 May 2021 06:57:43 +0300
Subject: [PATCH] Escape username before displaying it
All other values displayed in pop-ups are already
escaped.
---
deps/rabbitmq_management/priv/www/js/dispatcher.js | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Index: rabbitmq-server-3.8.11/deps/rabbitmq_management/priv/www/js/dispatcher.js
===================================================================
--- rabbitmq-server-3.8.11.orig/deps/rabbitmq_management/priv/www/js/dispatcher.js
+++ rabbitmq-server-3.8.11/deps/rabbitmq_management/priv/www/js/dispatcher.js
@@ -189,7 +189,7 @@ dispatcher_add(function(sammy) {
res = sync_put(this, '/users/:username');
if (res) {
if (res.http_status === 204) {
- username = res.req_params.username;
+ username = fmt_escape_html(res.req_params.username);
show_popup('warn', "Updated an existing user: '" + username + "'");
}
update();