Skip to content
Snippets Groups Projects
  1. May 26, 2010
  2. May 08, 2010
  3. May 05, 2010
  4. Apr 18, 2010
  5. Mar 26, 2010
  6. Mar 16, 2010
    • Michael Hamann's avatar
      Use md5sum of id and client ip as temporary filename in XML-RPC · c77fa67b
      Michael Hamann authored
      Before this patch the temporary filename was the uncleaned id. This
      allowed everyone with upload-privileges (on the whole wiki) and XML-RPC
      privileges on a XML-RPC-enabled DokuWiki to (over)write any file PHP is
      allowed to write with any content he wants. If you have XML-RPC enabled
      and users with XML-RPC and upload privileges you don't trust in a way
      you would allow them to write any file PHP may write, consider this as
      an important security fix. By default XML-RPC is disabled, so if you
      don't know what I'm talking about you are probably not affected by the
      problem.
      c77fa67b
  7. Mar 12, 2010
  8. Mar 10, 2010
  9. Feb 28, 2010
  10. Feb 24, 2010
  11. Feb 23, 2010
  12. Feb 15, 2010
  13. Feb 08, 2010
  14. Feb 01, 2010
  15. Jan 20, 2010
  16. Jan 12, 2010
  17. Dec 19, 2009
    • Andreas Gohr's avatar
      do not trim XMLRPC values FS#1824 · 56523eec
      Andreas Gohr authored
      Ignore-this: f43d3f070cfae4040e0e70648d0e541a
      The XMLRPC backend will not trim whitespaces or newlines from string values
      anymore.
      
      darcs-hash:20091219151652-7ad00-94d6cb26ff6396e09f107cf09dccb5423680c5c9.gz
      56523eec
  18. Nov 28, 2009
  19. Nov 16, 2009
    • Andreas Gohr's avatar
      Security Fix: do not allow skipacl in XMLRPC · 6fc3aa1a
      Andreas Gohr authored
      Ignore-this: 517a7546aab86c5370cccf1aa2171490
      
      Parameters passed to dokuwiki.getPagelist and wiki.getAttachments could
      contain the option "skipacl" which would prevent ACL checking. This
      could leak information about usually non-readable files (like filenames,
      sizes and so on). The content of the files was not accessible.
      
      XMLRPC is disabled by default.
      
      darcs-hash:20091116220523-7ad00-0fa8a9a7a52076619c6836738f9a1f00a6dafe27.gz
      6fc3aa1a
  20. Nov 15, 2009
  21. Nov 05, 2009
  22. Nov 04, 2009
    • Adrian Lang's avatar
      Emit less E_NOTICEs and E_STRICTs · c66972f2
      Adrian Lang authored
        Changes of behaviour are:
        * Allow the user name, title & description \e2\80\9c0\e2\80\9d
        * Default to Port 443 if using HTTPS
        * Set $INFO['isadmin'] and $INFO['ismanager'] to \e2\80\9cfalse\e2\80\9d even if no user is
          logged in
        * Do not pass empty fragment field in the event data for event
          ACTION_SHOW_REDIRECT
        * Handle chunked encoding in HTTPClient
      
      darcs-hash:20091104100115-e4919-5cf6397d4a457e3f98a8ca49fbdab03f2147721d.gz
      c66972f2
  23. Oct 28, 2009
  24. Nov 02, 2009
  25. Oct 18, 2009
  26. Oct 14, 2009
  27. Oct 07, 2009
    • Andreas Gohr's avatar
      New dformat() function for fuzzy date support · f2263577
      Andreas Gohr authored
      Ignore-this: 7193cd788fee2c05a9068bf6edd5dc17
      
      It is now possible to use the %f placeholder in $conf['dformat']
      to add a fuzzy age string.
      
      Template developers and plugin authors should replace their strftime +
      $conf['dformat'] calls with calls to the new dformat() function.
      
      Example:
      
         %Y/%m/%d %H:%M (%f) produces dates like this:
      
         2009/09/16 10:36 (3 weeks ago)
      
      darcs-hash:20091007133614-6e07b-677108d1b43928ef8fd886813e43514507b5e073.gz
      f2263577
  28. Oct 16, 2009
    • furun's avatar
      Whitespace cleanup FS#1709 · 47583ff0
      furun authored
      Ignore-this: 27ea52110bce929b2c61ed8faba67cfc
      
      darcs-hash:20091016205526-c0bf4-35eba4e65d37980a667ba982f7f1ea5b7b07f01c.gz
      47583ff0
  29. Oct 06, 2009
Loading