s3 swat: Add XSRF protection to wizard page
authorKai Blin <kai@samba.org>
Fri, 8 Jul 2011 13:03:44 +0000 (15:03 +0200)
committerKarolin Seeger <kseeger@samba.org>
Sun, 24 Jul 2011 19:27:19 +0000 (21:27 +0200)
Signed-off-by: Kai Blin <kai@samba.org>
source3/web/swat.c

index df3216e0103a23aaddd58017325c019db2df5dca..30bc2964d2f9345e69175d11a47d944988cb39dd 100644 (file)
@@ -752,6 +752,11 @@ static void wizard_page(void)
        int have_home = -1;
        int HomeExpo = 0;
        int SerType = 0;
+       const char form_name[] = "wizard";
+
+       if (!verify_xsrf_token(form_name)) {
+               goto output_page;
+       }
 
        if (cgi_variable("Rewrite")) {
                (void) rewritecfg_file();
@@ -842,10 +847,12 @@ static void wizard_page(void)
                winstype = 3;
 
        role = lp_server_role();
-       
+
+output_page:
        /* Here we go ... */
        printf("<H2>%s</H2>\n", _("Samba Configuration Wizard"));
        printf("<form method=post action=wizard>\n");
+       print_xsrf_token(cgi_user_name(), cgi_user_pass(), form_name);
 
        if (have_write_access) {
                printf("%s\n", _("The \"Rewrite smb.conf file\" button will clear the smb.conf file of all default values and of comments."));