manila-ui/manila_ui
Valeriy Ponomaryov 89593686ef Fix metadata_to_str function code injection vulnerability
It is possible to inject HTML/JavaScript code into shares table
member page setting metadata to shares and share types table admin page
setting extra specs. So, escape HTML-specific symbols in output
string of 'metadata_to_str' function to make it interpreted
as string and not as code.

Depends-On: If83e66d4b2f0f1db181e7c23ac256c498566c2da
Change-Id: Ied567e06d91941e9aaac7d3117e03cd1770fb75e
Security-Fix
Closes-Bug: #1597738
(clean cherry pick of commit fca19a1b0d)
2016-09-30 13:25:46 +03:00
..
api Fix call to Client() with 2 api_version args 2015-12-09 13:47:50 -08:00
dashboards Fix metadata_to_str function code injection vulnerability 2016-09-30 13:25:46 +03:00
enabled Remove overrides reference from Manila-UI plug-in 2015-08-21 14:00:25 -07:00
test Fix metadata_to_str function code injection vulnerability 2016-09-30 13:25:46 +03:00
utils Incoporate get_item filter 2015-04-09 16:34:30 -07:00
__init__.py Fix pep8 violations 2015-04-09 16:34:30 -07:00
exceptions.py Fix compatibility with Manilaclient and Horizon 2016-01-19 17:05:17 +02:00