s3 swat: Add XSRF protection to globals page
authorKai Blin <kai@samba.org>
Fri, 8 Jul 2011 13:04:12 +0000 (15:04 +0200)
committerJeremy Allison <jra@samba.org>
Tue, 26 Jul 2011 20:22:25 +0000 (22:22 +0200)
Signed-off-by: Kai Blin <kai@samba.org>
source3/web/swat.c

index ac182dd70767f90ee05437ec96beaeb66eb3c40a..7ce6893af19464a3c629af1fc7e7283c4fe714ae 100644 (file)
@@ -934,9 +934,14 @@ static void globals_page(void)
 {
        unsigned int parm_filter = FLAG_BASIC;
        int mode = 0;
+       const char form_name[] = "globals";
 
        printf("<H2>%s</H2>\n", _("Global Parameters"));
 
+       if (!verify_xsrf_token(form_name)) {
+               goto output_page;
+       }
+
        if (cgi_variable("Commit")) {
                commit_parameters(GLOBAL_SECTION_SNUM);
                save_reload(-1);
@@ -949,7 +954,9 @@ static void globals_page(void)
        if ( cgi_variable("AdvMode"))
                mode = 1;
 
+output_page:
        printf("<form name=\"swatform\" method=post action=globals>\n");
+       print_xsrf_token(cgi_user_name(), cgi_user_pass(), form_name);
 
        ViewModeBoxes( mode );
        switch ( mode ) {