summaryrefslogtreecommitdiff
path: root/www-apps/websvn
diff options
context:
space:
mode:
authorV3n3RiX <venerix@koprulu.sector>2021-12-22 14:08:05 +0000
committerV3n3RiX <venerix@koprulu.sector>2021-12-22 14:08:05 +0000
commit93a93e9a3b53c1a73142a305ea1f8136846942ee (patch)
treeb9791a06ab3284e27b568412c59316c66240c682 /www-apps/websvn
parent2771f79232c273bc2a57d23bf335dd81ccf6af28 (diff)
gentoo resync : 22.12.2021
Diffstat (limited to 'www-apps/websvn')
-rw-r--r--www-apps/websvn/Manifest6
-rw-r--r--www-apps/websvn/files/13_security_CVE-2013-6892.patch39
-rw-r--r--www-apps/websvn/files/30_CVE-2016-2511.patch11
-rw-r--r--www-apps/websvn/files/31_CVE-2016-1236.patch61
-rw-r--r--www-apps/websvn/metadata.xml13
-rw-r--r--www-apps/websvn/websvn-2.3.3-r1.ebuild53
6 files changed, 0 insertions, 183 deletions
diff --git a/www-apps/websvn/Manifest b/www-apps/websvn/Manifest
deleted file mode 100644
index 53213cba9c83..000000000000
--- a/www-apps/websvn/Manifest
+++ /dev/null
@@ -1,6 +0,0 @@
-AUX 13_security_CVE-2013-6892.patch 1624 BLAKE2B 9edff60bf9d9cf28ac78b6d01ab9c6030cac7981aef15d7b51ad39926c404a0d65bd0fce1fe79ce1ffc4c9b8096c65838f6e54bcb810a05620e780bba0f5d77a SHA512 93c92d09f4deb4368d78146dd5aae6ebc800974e4cf6a5ca9e2fe8a391631b6ab011fa1ba15443b27d8053f75e693c81d330db87ff533441b5381f3af9c9e43e
-AUX 30_CVE-2016-2511.patch 605 BLAKE2B 02c792bee252dd2dd94ffa86c4e08da05c938c98cdf4ce8897ab51005b9d3dfb2f9999ec1a6b04750fb4589604851de95579c61eb0151f758d6f80685572cbc0 SHA512 ee6f538c050d98ec058d586349ae90bc682a0e869b5bf53005e5badf6b583e697ac6411468abb218f78365ac1867a5ed576b99917ff9427740d82256d29f150b
-AUX 31_CVE-2016-1236.patch 2523 BLAKE2B 98f9eddb5ff7e1f3eace26a8ac2ac97812beb6b4dd13794a8167d7627c732a6c1f62689cf876df996f0cdc6affe863b280bae0d87dc51f129bfaf03e9f628d22 SHA512 d41a2afe42ac520d8c2d8085f90b1dc4364d82d7fc8905e54b40cbdaa80abf902c0b37b075a78c3af30feb2a1869efb11519e7b6a42d691ecd8e51c41f8b4382
-DIST websvn-2.3.3.tar.gz 882779 BLAKE2B e851bdd8cf42c34202c8416b5f63d0b4b6731f082d1103eaf21689bd65ddb11d8ed2d9d1a8e476d2c342db9b59bc7dea37ae0c9eb929a8c8298dfa3965da34ce SHA512 8c77a9770dfc3c9487793cd71c460d4048aa4aa7b8520a53eea8ae872f30e06d885f849d63fa0e9f61ed5923f9dd9c5ef1f3c4f020afaa83d7815a99d64818a0
-EBUILD websvn-2.3.3-r1.ebuild 1143 BLAKE2B dc1d38fb3c87819cb26defafcc76f6c887291fd3b7143b2d5f4311b16c6c826bc88dd68fc545cacf79be8e1e12b4da3e3720c35942967e0f2521b4c5f4d80692 SHA512 b3bd4c4e5a7d694fbadd3ea1b01f1e1359f832b703b5aa438abd80d00c6cec314e5b851812a0238e5edaa444c4a2828366281ea41ae2dd26b6e57c0002a80ede
-MISC metadata.xml 387 BLAKE2B a8f5368351198bc5353ecd85861508b74af75dafc517b56b8801241fd31b27b7a90461d0be2e3e8a6d5994d915b6f164d34b01fec3a9ff407bb57bf9763a6ac8 SHA512 eff0a777d83c3fa9e99283d99e8035c952342e90ac910b1237e234d9d5f5cbc284e2505aec773a46ef781761c5b1aacba3d18cc7010d668b8465b1d2f219c513
diff --git a/www-apps/websvn/files/13_security_CVE-2013-6892.patch b/www-apps/websvn/files/13_security_CVE-2013-6892.patch
deleted file mode 100644
index ffb14e84aa11..000000000000
--- a/www-apps/websvn/files/13_security_CVE-2013-6892.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-Arbitrary files with a known path can be accessed in websvn by committing a
-symlink to a repository and then downloading the file (using the download
-link).
-
-Author: Thijs Kinkhorst <thijs@debian.org>
-
-https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775682
-
-diff -ur oud/dl.php nieuw/dl.php
---- oud/dl.php 2015-01-18 16:03:30.688791512 +0100
-+++ nieuw/dl.php 2015-01-18 16:27:00.950897749 +0100
-@@ -137,6 +137,18 @@
- exit(0);
- }
-
-+ // For security reasons, disallow direct downloads of filenames that
-+ // are a symlink, since they may be a symlink to anywhere (/etc/passwd)
-+ // Deciding whether the symlink is relative and legal within the
-+ // repository would be nice but seems to error prone at this moment.
-+ if ( is_link($tempDir.DIRECTORY_SEPARATOR.$archiveName) ) {
-+ header('HTTP/1.x 500 Internal Server Error', true, 500);
-+ error_log('to be downloaded file is symlink, aborting: '.$archiveName);
-+ print 'Download of symlinks disallowed: "'.xml_entities($archiveName).'".';
-+ removeDirectory($tempDir);
-+ exit(0);
-+ }
-+
- // Set timestamp of exported directory (and subdirectories) to timestamp of
- // the revision so every archive of a given revision has the same timestamp.
- $revDate = $logEntry->date;
-@@ -180,7 +192,7 @@
- $downloadMimeType = 'application/x-zip';
- $downloadArchive .= '.zip';
- // Create zip file
-- $cmd = $config->zip.' -r '.quote($downloadArchive).' '.quote($archiveName);
-+ $cmd = $config->zip.' --symlinks -r '.quote($downloadArchive).' '.quote($archiveName);
- execCommand($cmd, $retcode);
- if ($retcode != 0) {
- error_log('Unable to call zip command: '.$cmd);
diff --git a/www-apps/websvn/files/30_CVE-2016-2511.patch b/www-apps/websvn/files/30_CVE-2016-2511.patch
deleted file mode 100644
index 9c270bbc4582..000000000000
--- a/www-apps/websvn/files/30_CVE-2016-2511.patch
+++ /dev/null
@@ -1,11 +0,0 @@
---- orig/include/setup.php 2016-02-19 16:02:05.674756241 +0100
-+++ new/include/setup.php 2016-02-19 16:02:10.166832543 +0100
-@@ -467,7 +467,7 @@
- $vars['validationurl'] = getFullURL($_SERVER['SCRIPT_NAME']).'?'.buildQuery($queryParams + array('template' => $template, 'language' => $language), '%26');
-
- // To avoid a possible XSS exploit, need to clean up the passed-in path first
--$path = !empty($_REQUEST['path']) ? $_REQUEST['path'] : null;
-+$path = !empty($_REQUEST['path']) ? escape($_REQUEST['path']) : null;
- if ($path === null || $path === '')
- $path = '/';
- $vars['safepath'] = escape($path);
diff --git a/www-apps/websvn/files/31_CVE-2016-1236.patch b/www-apps/websvn/files/31_CVE-2016-1236.patch
deleted file mode 100644
index 13ff2be66f86..000000000000
--- a/www-apps/websvn/files/31_CVE-2016-1236.patch
+++ /dev/null
@@ -1,61 +0,0 @@
-Description: CVE-2016-1236: XSS via directory or file in a repository containing XSS payload
-Origin: vendor
-Forwarded: no
-Author: Nitin Venkatesh <venkatesh.nitin@gmail.com>
-Reviewed-by: Salvatore Bonaccorso <carnil@debian.org>
-Last-Update: 2016-05-08
-
---- a/revision.php
-+++ b/revision.php
-@@ -145,7 +145,7 @@ if ($rep) {
- }
- $resourceExisted = $change->action == 'M' || $change->copyfrom;
- $listing[] = array(
-- 'path' => $change->path,
-+ 'path' => escape($change->path),
- 'oldpath' => $change->copyfrom ? $change->copyfrom.' @ '.$change->copyrev : '',
- 'action' => $change->action,
- 'added' => $change->action == 'A',
---- a/log.php
-+++ b/log.php
-@@ -323,6 +323,9 @@ if ($rep) {
- $listing[$index]['revadded'] = (isset($modpaths['A'])) ? implode('<br/>', $modpaths['A']) : '';
- $listing[$index]['revdeleted'] = (isset($modpaths['D'])) ? implode('<br/>', $modpaths['D']) : '';
- $listing[$index]['revmodified'] = (isset($modpaths['M'])) ? implode('<br/>', $modpaths['M']) : '';
-+ $listing[$index]['revadded'] = escape($listing[$index]['revadded']);
-+ $listing[$index]['revdeleted'] = escape($listing[$index]['revdeleted']);
-+ $listing[$index]['revmodified'] = escape($listing[$index]['revmodified']);
- }
-
- $row = 1 - $row;
---- a/comp.php
-+++ b/comp.php
-@@ -381,7 +381,7 @@ if ($rep) {
- $absnode .= $node;
- }
-
-- $listing[$index]['newpath'] = $absnode;
-+ $listing[$index]['newpath'] = escape($absnode);
-
- $listing[$index]['fileurl'] = $config->getURL($rep, $absnode, 'file').'rev='.$rev2;
-
---- a/listing.php
-+++ b/listing.php
-@@ -123,7 +123,7 @@ function showDirFiles($svnrep, $subs, $l
- $listing[$index]['level'] = ($treeview) ? $level : 0;
- $listing[$index]['node'] = 0; // t-node
- $listing[$index]['path'] = $path.$file;
-- $listing[$index]['filename'] = $file;
-+ $listing[$index]['filename'] = escape($file);
- if ($isDir) {
- $listing[$index]['fileurl'] = urlForPath($path.$file, $passRevString);
- } else {
-@@ -137,7 +137,7 @@ function showDirFiles($svnrep, $subs, $l
- }
-
- if ($treeview) {
-- $listing[$index]['compare_box'] = '<input type="checkbox" name="compare[]" value="'.$path.$file.'@'.$passrev.'" onclick="checkCB(this)" />';
-+ $listing[$index]['compare_box'] = '<input type="checkbox" name="compare[]" value="'.escape($path.$file).'@'.$passrev.'" onclick="checkCB(this)" />';
- }
- if ($config->showLastModInListing()) {
- $listing[$index]['committime'] = $entry->committime;
diff --git a/www-apps/websvn/metadata.xml b/www-apps/websvn/metadata.xml
deleted file mode 100644
index 7e524f51be9e..000000000000
--- a/www-apps/websvn/metadata.xml
+++ /dev/null
@@ -1,13 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE pkgmetadata SYSTEM "https://www.gentoo.org/dtd/metadata.dtd">
-<pkgmetadata>
- <maintainer type="project">
- <email>web-apps@gentoo.org</email>
- <name>Gentoo Webapps</name>
- </maintainer>
- <stabilize-allarches/>
- <use>
- <flag name="enscript">Add enscript support to colorize code
- stored in the repository</flag>
- </use>
-</pkgmetadata>
diff --git a/www-apps/websvn/websvn-2.3.3-r1.ebuild b/www-apps/websvn/websvn-2.3.3-r1.ebuild
deleted file mode 100644
index 285fce66b2fb..000000000000
--- a/www-apps/websvn/websvn-2.3.3-r1.ebuild
+++ /dev/null
@@ -1,53 +0,0 @@
-# Copyright 1999-2017 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI="6"
-
-inherit webapp
-
-MY_P="${P//_/}"
-
-DESCRIPTION="Web-based browsing tool for Subversion (SVN) repositories in PHP"
-HOMEPAGE="http://www.websvn.info/ http://websvn.tigris.org/"
-DOWNLOAD_NUMBER="49056"
-SRC_URI="http://websvn.tigris.org/files/documents/1380/${DOWNLOAD_NUMBER}/${MY_P}.tar.gz"
-
-LICENSE="GPL-2"
-IUSE="enscript"
-KEYWORDS="amd64 ppc ppc64 ~sparc x86"
-
-DEPEND=""
-RDEPEND="dev-lang/php:*[xml]
- dev-vcs/subversion
- virtual/httpd-php:*
- enscript? ( app-text/enscript )"
-RESTRICT="mirror"
-
-PATCHES=(
- "${FILESDIR}/13_security_CVE-2013-6892.patch"
- "${FILESDIR}/30_CVE-2016-2511.patch"
- "${FILESDIR}/31_CVE-2016-1236.patch"
-)
-
-S="${WORKDIR}/${MY_P}"
-
-src_install() {
- webapp_src_preinst
-
- DOCS=( changes.txt )
- HTML_DOCS=( doc/* )
- einstalldocs
-
- mv include/{dist,}config.php
- rm -rf license.txt changes.txt doc/
-
- insinto "${MY_HTDOCSDIR}"
- doins -r .
-
- webapp_configfile "${MY_HTDOCSDIR}"/include/config.php
- webapp_configfile "${MY_HTDOCSDIR}"/wsvn.php
-
- webapp_serverowned "${MY_HTDOCSDIR}"/cache
-
- webapp_src_install
-}