Koha/koha-tmpl
Jonathan Druart 6f5e2f8a86 Bug 17116: Fix CSRF in import_borrowers.pl
If an attacker can get an authenticated Koha user to visit their page
with the url below, they can change patrons' information

The exploit can be simulated triggering
  /tools/import_borrowers.pl?uploadborrowers=42

In that case it won't do anything wrong, but it you POST a valid file,
it could.

Test plan:
Trigger the url above
=> Without this patch, you will the result page
=> With this patch, you will get the "Wrong CSRF token" error.

Regression test:
Import a valid file from the import patron form, everything should go
fine.

Signed-off-by: Chris Cormack <chrisc@catalyst.net.nz>
Signed-off-by: Marcel de Rooy <m.de.rooy@rijksmuseum.nl>

Signed-off-by: Kyle M Hall <kyle@bywatersolutions.com>
2016-09-02 13:47:02 +00:00
..
intranet-tmpl Bug 17116: Fix CSRF in import_borrowers.pl 2016-09-02 13:47:02 +00:00
opac-tmpl Bug 17117: Patron personal details not displayed unless branch update request is enabled 2016-08-18 15:59:42 +00:00
favicon.ico
index.html
intranet.html
opac.html