summaryrefslogtreecommitdiff
blob: da2647b49b53ea7876315d5c49d5df023a6ecdb8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
Index: lynx2-8-6/CHANGES
===================================================================
--- lynx2-8-6.orig/CHANGES
+++ lynx2-8-6/CHANGES
@@ -1,6 +1,13 @@
 Changes since Lynx 2.8 release
 ===============================================================================
 
+2008-10-26
+* modify patch for CVE-2005-2929 to prompt user before executing command via
+  a lynxcgi link even in advanced mode, as the actual URL may not be shown but
+  hidden behind an HTTP redirect
+* set TRUSTED_LYNXCGI:none in lynx.cfg to disable all lynxcgi URLs by default
+  [CVE-2008-4690]
+
 2006-11-15 (2.8.6rel.4 diverges from 2.8.7dev.4)
 * limit files set via PERSONAL_EXTENSION_MAP and PERSONAL_MAILCAP to be found
   relative to the user's home directory.  This change is less flexible than the
Index: lynx2-8-6/lynx.cfg
===================================================================
--- lynx2-8-6.orig/lynx.cfg
+++ lynx2-8-6/lynx.cfg
@@ -1026,7 +1026,7 @@ DEFAULT_INDEX_FILE:http://lynx.isc.org/
 # ====
 # Do not define this.
 #
-#TRUSTED_LYNXCGI:none
+TRUSTED_LYNXCGI:none
 
 
 .h2 LYNXCGI_ENVIRONMENT
Index: lynx2-8-6/src/LYCgi.c
===================================================================
--- lynx2-8-6.orig/src/LYCgi.c
+++ lynx2-8-6/src/LYCgi.c
@@ -165,7 +165,7 @@ static BOOL can_exec_cgi(const char *lin
     if (!exec_ok(HTLoadedDocumentURL(), linktext, CGI_PATH)) {
 	/* exec_ok gives out msg. */
 	result = FALSE;
-    } else if (user_mode < ADVANCED_MODE) {
+    } else {
 	StrAllocCopy(command, linktext);
 	if (non_empty(linkargs)) {
 	    HTSprintf(&command, " %s", linkargs);