File size: 39,798 Bytes
5e5d5e0
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
{"code": "\t\tfunction uninstallPage()\n\t\t{\n\t\t\t$id = $this->getId();\n\n\t\t\tif(empty($_POST['uninstall_confirm']))\n\t\t\t{\n\n\t\t\t\t$plug_vars = e107::getPlug()->load($id)->getMeta();\n\n\t\t\t\t$name = e107::getPlug()->getName();\n\t\t\t\t$this->addTitle(EPL_ADLAN_63);\n\t\t\t\t$this->addTitle($name);\n\n\t\t\t\treturn $this->pluginConfirmUninstall($plug_vars);\n\t\t\t}\n\n\t\t\t$post = e107::getParser()->filter($_POST);\n\n\n\n\t\t//\t$id = e107::getPlugin\n\n\t\t\t$text = e107::getPlugin()->uninstall($id, $post);\n\n\t\t\te107::getMessage()->add($text, E_MESSAGE_SUCCESS);\n\t\t\t$log = e107::getPlugin()->getLog();\n\t\t\te107::getDebug()->log($log);\n\n\t\t\t$this->redirectAction('list');\n\t\t}", "label_name": "CWE-352", "label": 0}
{"code": "    function restart($sMessage = '')\n    {\n        $_COOKIE['sessionID'] = phpAds_SessionStart();\n        OA_Auth::displayLogin($sMessage, $_COOKIE['sessionID']);\n    }", "label_name": "CWE-384", "label": 1}
{"code": "function select_atversion(){ \n    global $sort_versions;\n    $menu = '<form action=\"'.$_SERVER['PHP_SELF'].'\" method=\"post\">'; \n    $menu.= '<select name=\"atversions\">';\n    $menu.= '<option value=\"0\">'._AT(\"all\").'</option>';\n    foreach($sort_versions as $version){\n        if($version == VERSION){\n            $menu .= '<option value=\"'.$version.'\" selected=\"selected\">'.$version.'</option>';\n        }else{\n            $menu .= '<option value=\"'.$version.'\" >'.$version.'</option>';\n        }\n    }\n    $menu .='</select>';\n    $menu .='<input type=\"submit\"  value=\"'. _AT('filter').'\"/></form>';\n    return $menu;\n}", "label_name": "CWE-352", "label": 0}
{"code": "    public static function dropdown($vars) {\n        if(is_array($vars)){\n            //print_r($vars);\n            $name = $vars['name'];\n            $where = \"WHERE \";\n            if(isset($vars['parent'])) {\n                $where .= \" `parent` = '{$vars['parent']}' \";\n            }else{\n                $where .= \"1 \";\n            }\n            $order_by = \"ORDER BY \";\n            if(isset($vars['order_by'])) {\n                $order_by .= \" {$vars['order_by']} \";\n            }else{\n                $order_by .= \" `name` \";\n            }\n            if (isset($vars['sort'])) {\n                $sort = \" {$vars['sort']}\";\n            }\n        }\n        $cat = Db::result(\"SELECT * FROM `cat` {$where} {$order_by} {$sort}\");\n        $drop = \"<select name=\\\"{$name}\\\" class=\\\"form-control\\\"><option></option>\";\n        if(Db::$num_rows > 0 ){\n            foreach ($cat as $c) {\n                # code...\n                if($c->parent == ''){\n                    if(isset($vars['selected']) && $c->id == $vars['selected']) $sel = \"SELECTED\"; else $sel = \"\";\n                    $drop .= \"<option value=\\\"{$c->id}\\\" $sel style=\\\"padding-left: 10px;\\\">{$c->name}</option>\";\n                    foreach ($cat as $c2) {\n                        # code...\n                        if($c2->parent == $c->id){\n                            if(isset($vars['selected']) && $c2->id == $vars['selected']) $sel = \"SELECTED\"; else $sel = \"\";\n                            $drop .= \"<option value=\\\"{$c2->id}\\\" $sel style=\\\"padding-left: 10px;\\\">&nbsp;&nbsp;&nbsp;{$c2->name}</option>\";\n                        }\n                    }\n                }\n                \n            }\n        }\n        $drop .= \"</select>\";\n\n        return $drop;\n    }", "label_name": "CWE-352", "label": 0}
{"code": "            self::$mysqli = new mysqli(DB_HOST, DB_USER, DB_PASS, DB_NAME);\n            return self::$mysqli;\n        }\n    }", "label_name": "CWE-352", "label": 0}
{"code": "    public static function makeConfig ($file) {\n        $config = \"<?php if(!defined('GX_LIB')) die(\\\"Direct Access Not Allowed!\\\");\n/**\n* GeniXCMS - Content Management System\n* \n* PHP Based Content Management System and Framework\n*\n* @package GeniXCMS\n* @since 0.0.1 build date 20140925\n* @version 0.0.1\n* @link https://github.com/semplon/GeniXCMS\n* @author Puguh Wijayanto (www.metalgenix.com)\n* @copyright 2014-2015 Puguh Wijayanto\n* @license http://www.opensource.org/licenses/mit-license.php MIT\n*\n*/\n\n// DB CONFIG\ndefine('DB_HOST', '\".Session::val('dbhost').\"');\ndefine('DB_NAME', '\".Session::val('dbname').\"');\ndefine('DB_PASS', '\".Session::val('dbpass').\"');\ndefine('DB_USER', '\".Session::val('dbuser').\"');\ndefine('DB_DRIVER', 'mysqli');\n\n\ndefine('THEME', 'default');\ndefine('GX_LANG', 'english');\ndefine('SMART_URL', false); //set 'true' if you want use SMART URL (SEO Friendly URL)\ndefine('GX_URL_PREFIX', '.html');\ndefine('SECURITY', '\".Typo::getToken(200).\"'); // for security purpose, will be used for creating password\n\n        \";\n        try{\n            $f = fopen($file, \"w\");\n            $c = fwrite($f, $config);\n            fclose($f);\n        }catch (Exception $e) {\n            echo $e->getMessage();\n        }\n        \n        return $config;\n    }", "label_name": "CWE-352", "label": 0}
{"code": "        $data .= '<input type=\"hidden\" name=\"'.htmlspecialchars($key).'\" value=\"'.htmlspecialchars($value).'\" />';\n    }\n    echo \"<html><head><title>CSRF check failed</title></head>\n        <body>\n        <p>CSRF check failed. Your form session may have expired, or you may not have\n        cookies enabled.</p>\n        <form method='post' action=''>$data<input type='submit' value='Try again' /></form>\n        <p>Debug: $tokens</p></body></html>\n\";\n}", "label_name": "CWE-352", "label": 0}
{"code": "    public function delete(){\n        $cat_id = I(\"cat_id/d\")? I(\"cat_id/d\") : 0;\n        $cat = D(\"Catalog\")->where(\" cat_id = '$cat_id' \")->find();\n        $item_id = $cat['item_id'];\n        \n        $login_user = $this->checkLogin();\n        if (!$this->checkItemEdit($login_user['uid'] , $item_id)) {\n            $return['error_code'] = -1 ;\n            $return['error_message'] = L('no_permissions');\n            $this->sendResult($return);\n            return;\n        }\n\n        if ($cat_id > 0 ) {\n            \n            $ret = D(\"Catalog\")->deleteCat($cat_id);\n\n        }\n        if ($ret) {\n           $this->sendResult($ret);\n        }else{\n            $return['error_code'] = -1 ;\n            $return['error_message'] = 'request  fail' ;\n            $this->sendResult($return);\n        }\n    }", "label_name": "CWE-352", "label": 0}
{"code": "\tpublic static function GetNewTransactionId()\n\t{\n\t\tif (!is_dir(APPROOT.'data/transactions'))\n\t\t{\n\t\t\tif (!is_writable(APPROOT.'data'))\n\t\t\t{\n\t\t\t\tthrow new Exception('The directory \"'.APPROOT.'data\" must be writable to the application.');\n\t\t\t}\n\t\t\t/** @noinspection MkdirRaceConditionInspection */\n\t\t\tif (!@mkdir(APPROOT.'data/transactions'))\n\t\t\t{\n\t\t\t\tthrow new Exception('Failed to create the directory \"'.APPROOT.'data/transactions\". Ajust the rights on the parent directory or let an administrator create the transactions directory and give the web sever enough rights to write into it.');\n\t\t\t}\n\t\t}\n\t\tif (!is_writable(APPROOT.'data/transactions'))\n\t\t{\n\t\t\tthrow new Exception('The directory \"'.APPROOT.'data/transactions\" must be writable to the application.');\n\t\t}\n\t\tself::CleanupOldTransactions();\n\t\t$id = basename(tempnam(APPROOT.'data/transactions', static::GetUserPrefix()));\n\t\tself::Info('GetNewTransactionId: Created transaction: '.$id);\n\n\t\treturn (string)$id;\n\t}", "label_name": "CWE-352", "label": 0}
{"code": "\tpublic static function IsTransactionValid($id, $bRemoveTransaction = true)\n\t{\n\t\t// Constraint the transaction file within APPROOT.'data/transactions'\n\t\t$sTransactionDir = realpath(APPROOT.'data/transactions');\n\t\t$sFilepath = utils::RealPath($sTransactionDir.'/'.$id, $sTransactionDir);\n\t\tif (($sFilepath === false) || (strlen($sTransactionDir) == strlen($sFilepath)))\n\t\t{\n\t\t\treturn false;\n\t\t}\n\n\t\tclearstatcache(true, $sFilepath);\n\t\t$bResult = file_exists($sFilepath);\n\t\tif ($bResult)\n\t\t{\n\t\t\tif ($bRemoveTransaction)\n\t\t\t{\n\t\t\t\t$bResult = @unlink($sFilepath);\n\t\t\t\tif (!$bResult)\n\t\t\t\t{\n\t\t\t\t\tself::Error('IsTransactionValid: FAILED to remove transaction '.$id);\n\t\t\t\t}\n\t\t\t\telse\n\t\t\t\t{\n\t\t\t\t\tself::Info('IsTransactionValid: OK. Removed transaction: '.$id);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\telse\n\t\t{\n\t\t\tself::Info(\"IsTransactionValid: Transaction '$id' not found. Pending transactions for this user:\\n\".implode(\"\\n\", self::GetPendingTransactions()));\n\t\t}\n\t\treturn $bResult;\n\t}", "label_name": "CWE-352", "label": 0}
{"code": "\t\t\t\t$this->doDelete( $type, $dump );\n\t\t\t}\n\t\t}\n\n\t\t$pager = new DataDumpPager( $this->getContext(), $this->getPageTitle() );\n\n\t\t$out->addModuleStyles( 'mediawiki.special' );\n\n\t\t$pager->getForm();\n\t\t$out->addParserOutputContent( $pager->getFullOutput() );\n\t}", "label_name": "CWE-352", "label": 0}
{"code": "    public function setPassword(Request $request, string $token)\n    {\n        $this->validate($request, [\n            'password' => ['required', 'min:8'],\n        ]);\n\n        try {\n            $userId = $this->inviteService->checkTokenAndGetUserId($token);\n        } catch (Exception $exception) {\n            return $this->handleTokenException($exception);\n        }\n\n        $user = $this->userRepo->getById($userId);\n        $user->password = bcrypt($request->get('password'));\n        $user->email_confirmed = true;\n        $user->save();\n\n        $this->inviteService->deleteByUser($user);\n        $this->showSuccessNotification(trans('auth.user_invite_success', ['appName' => setting('app-name')]));\n        $this->loginService->login($user, auth()->getDefaultDriver());\n\n        return redirect('/');\n    }", "label_name": "CWE-352", "label": 0}
{"code": "    public function buildView(FormView $view, FormInterface $form, array $options)\n    {\n        if (!isset($options['api_data'])) {\n            return;\n        }\n\n        $apiData = $options['api_data'];\n\n        if (!\\is_array($apiData)) {\n            throw new \\InvalidArgumentException('Option \"api_data\" must be an array for form \"' . $form->getName() . '\"');\n        }\n\n        if (!isset($apiData['select'])) {\n            return;\n        }\n\n        if (!isset($apiData['route'])) {\n            throw new \\InvalidArgumentException('Missing \"route\" option for \"api_data\" option for form \"' . $form->getName() . '\"');\n        }\n\n        if (!isset($apiData['route_params'])) {\n            $apiData['route_params'] = [];\n        }\n\n        $formPrefixes = [];\n        $parent = $form->getParent();\n        do {\n            $formPrefixes[] = $parent->getName();\n        } while (($parent = $parent->getParent()) !== null);\n\n        $formPrefix = implode('_', array_reverse($formPrefixes));\n\n        $formField = $formPrefix . '_' . $apiData['select'];\n\n        $view->vars['attr'] = array_merge($view->vars['attr'], [\n            'data-form-prefix' => $formPrefix,\n            'data-related-select' => $formField,\n            'data-api-url' => $this->router->generate($apiData['route'], $apiData['route_params']),\n        ]);\n\n        if (isset($apiData['empty_route_params'])) {\n            $view->vars['attr'] = array_merge($view->vars['attr'], [\n                'data-empty-url' => $this->router->generate($apiData['route'], $apiData['empty_route_params']),\n            ]);\n        }\n    }", "label_name": "CWE-352", "label": 0}
{"code": "rcube_webmail.prototype.enigma_export = function(selected)\n{\n    var keys = selected ? this.keys_list.get_selection().join(',') : '*';\n\n    if (!keys.length)\n        return;\n\n    this.goto_url('plugin.enigmakeys', {_a: 'export', _keys: keys});\n};", "label_name": "CWE-352", "label": 0}
{"code": "\tdeleteTheme: function() {\n\t\treturn confirm( themes.data.settings.confirmDelete );\n\t},", "label_name": "CWE-352", "label": 0}
{"code": "\twp.updates.beforeunload = function() {\n\t\tif ( wp.updates.updateLock ) {\n\t\t\treturn wp.updates.l10n.beforeunload;\n\t\t}\n\t};", "label_name": "CWE-352", "label": 0}
{"code": "\twp.updates.credentialError = function( response, type ) {\n\t\twp.updates.updateQueue.push( {\n\t\t\t'type': type,\n\t\t\t'data': {\n\t\t\t\t// Not cool that we're depending on response for this data.\n\t\t\t\t// This would feel more whole in a view all tied together.\n\t\t\t\tplugin: response.plugin,\n\t\t\t\tslug: response.slug\n\t\t\t}\n\t\t} );\n\t\twp.updates.showErrorInCredentialsForm( response.error );\n\t\twp.updates.requestFilesystemCredentials();\n\t};", "label_name": "CWE-352", "label": 0}
{"code": "        success:function (data, textStatus) {\n            showMessage('success', 'Homepage set.');\n            $('#setHomePage').addClass('orange');\n        },", "label_name": "CWE-352", "label": 0}
{"code": "function checkAddingNode(){\n  var nodeName = $(\"#add_node\").children(\"form\").find(\"[name='new_nodename']\").val().trim();\n  if (nodeName == \"\") {\n    $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n    return false;\n  }\n\n  $.ajax({\n    type: 'GET',\n    url: '/manage/check_pcsd_status',\n    data: {\"nodes\": nodeName},\n    timeout: pcs_timeout,\n    success: function (data) {\n      var mydata = jQuery.parseJSON(data);\n      if (mydata[nodeName] == \"Unable to authenticate\") {\n        auth_nodes_dialog([nodeName], function(){$(\"#add_node_submit_btn\").trigger(\"click\");});\n        $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n      } else if (mydata[nodeName] == \"Offline\") {\n        alert(\"Unable to contact node '\" + nodeName + \"'\");\n        $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n      } else {\n        create_node($(\"#add_node\").children(\"form\"));\n      }\n    },\n    error: function (XMLHttpRequest, textStatus, errorThrown) {\n      alert(\"ERROR: Unable to contact server\");\n      $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n    }\n  });\n}", "label_name": "CWE-384", "label": 1}
{"code": "    $scope.initialize = function(customHandler) {\n      var value = $cookies.get('requisitions_page_size');\n      if (value) {\n        $scope.pageSize = value;\n      }\n      growl.success('Retrieving requisition ' + $scope.foreignSource + '...');\n      RequisitionsService.getRequisition($scope.foreignSource).then(\n        function(requisition) { // success\n          $scope.requisition = requisition;\n          $scope.filteredNodes = requisition.nodes;\n          $scope.updateFilteredNodes();\n          if (customHandler) {\n            customHandler();\n          }\n        },\n        $scope.errorHandler\n      );\n    };", "label_name": "CWE-352", "label": 0}
{"code": "    this.changeUserSettings = function(attr,value){\n    \t$.get(this.wwwDir+  'user/setsettingajax/'+attr+'/'+value);\n    };", "label_name": "CWE-352", "label": 0}
{"code": "    def test_reset_student_attempts_delete(self):\n        \"\"\" Test delete single student state. \"\"\"\n        url = reverse('reset_student_attempts', kwargs={'course_id': self.course.id.to_deprecated_string()})\n        response = self.client.get(url, {\n            'problem_to_reset': self.problem_urlname,\n            'unique_student_identifier': self.student.email,\n            'delete_module': True,\n        })\n        self.assertEqual(response.status_code, 200)\n        # make sure the module has been deleted\n        self.assertEqual(\n            StudentModule.objects.filter(\n                student=self.module_to_reset.student,\n                course_id=self.module_to_reset.course_id,\n                # module_id=self.module_to_reset.module_id,\n            ).count(),\n            0\n        )", "label_name": "CWE-352", "label": 0}
{"code": "    def test_list_email_content_error(self, task_history_request):\n        \"\"\" Test handling of error retrieving email \"\"\"\n        invalid_task = FakeContentTask(0, 0, 0, 'test')\n        invalid_task.make_invalid_input()\n        task_history_request.return_value = [invalid_task]\n        url = reverse('list_email_content', kwargs={'course_id': self.course.id.to_deprecated_string()})\n        response = self.client.get(url, {})\n        self.assertEqual(response.status_code, 200)\n\n        self.assertTrue(task_history_request.called)\n        returned_email_info = json.loads(response.content)['emails']\n        self.assertEqual(len(returned_email_info), 1)\n        returned_info = returned_email_info[0]\n        for info in ['created', 'sent_to', 'email', 'number_sent', 'requester']:\n            self.assertEqual(returned_info[info], None)", "label_name": "CWE-352", "label": 0}
{"code": "    def test_rescore_entrance_exam_with_invalid_exam(self):\n        \"\"\" Test course has entrance exam id set while re-scoring. \"\"\"\n        url = reverse('rescore_entrance_exam', kwargs={'course_id': unicode(self.course.id)})\n        response = self.client.get(url, {\n            'unique_student_identifier': self.student.email,\n        })\n        self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
{"code": "    def test_get_students_who_may_enroll(self):\n        \"\"\"\n        Test whether get_students_who_may_enroll returns an appropriate\n        status message when users request a CSV file of students who\n        may enroll in a course.\n        \"\"\"\n        url = reverse(\n            'get_students_who_may_enroll',\n            kwargs={'course_id': unicode(self.course.id)}\n        )\n        # Successful case:\n        response = self.client.get(url, {})\n        res_json = json.loads(response.content)\n        self.assertIn('status', res_json)\n        self.assertNotIn('currently being created', res_json['status'])\n        # CSV generation already in progress:\n        with patch('instructor_task.api.submit_calculate_may_enroll_csv') as submit_task_function:\n            error = AlreadyRunningError()\n            submit_task_function.side_effect = error\n            response = self.client.get(url, {})\n            res_json = json.loads(response.content)\n            self.assertIn('status', res_json)\n            self.assertIn('currently being created', res_json['status'])", "label_name": "CWE-352", "label": 0}
{"code": "    def test_get_sale_records_features_csv(self):\n        \"\"\"\n        Test that the response from get_sale_records is in csv format.\n        \"\"\"\n        for i in range(2):\n            course_registration_code = CourseRegistrationCode(\n                code='sale_invoice{}'.format(i),\n                course_id=self.course.id.to_deprecated_string(),\n                created_by=self.instructor,\n                invoice=self.sale_invoice_1,\n                invoice_item=self.invoice_item,\n                mode_slug='honor'\n            )\n            course_registration_code.save()\n\n        url = reverse(\n            'get_sale_records',\n            kwargs={'course_id': self.course.id.to_deprecated_string()}\n        )\n        response = self.client.get(url + '/csv', {})\n        self.assertEqual(response['Content-Type'], 'text/csv')", "label_name": "CWE-352", "label": 0}
{"code": "    def test_modify_access_revoke(self):\n        url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n        response = self.client.get(url, {\n            'unique_student_identifier': self.other_staff.email,\n            'rolename': 'staff',\n            'action': 'revoke',\n        })\n        self.assertEqual(response.status_code, 200)", "label_name": "CWE-352", "label": 0}
{"code": "    def get_email_content_response(self, num_emails, task_history_request, with_failures=False):\n        \"\"\" Calls the list_email_content endpoint and returns the repsonse \"\"\"\n        self.setup_fake_email_info(num_emails, with_failures)\n        task_history_request.return_value = self.tasks.values()\n        url = reverse('list_email_content', kwargs={'course_id': self.course.id.to_deprecated_string()})\n        with patch('instructor.views.api.CourseEmail.objects.get') as mock_email_info:\n            mock_email_info.side_effect = self.get_matching_mock_email\n            response = self.client.get(url, {})\n        self.assertEqual(response.status_code, 200)\n        return response", "label_name": "CWE-352", "label": 0}
{"code": "    def test_get_student_progress_url(self):\n        \"\"\" Test that progress_url is in the successful response. \"\"\"\n        url = reverse('get_student_progress_url', kwargs={'course_id': self.course.id.to_deprecated_string()})\n        url += \"?unique_student_identifier={}\".format(\n            quote(self.students[0].email.encode(\"utf-8\"))\n        )\n        response = self.client.get(url)\n        self.assertEqual(response.status_code, 200)\n        res_json = json.loads(response.content)\n        self.assertIn('progress_url', res_json)", "label_name": "CWE-352", "label": 0}
{"code": "    def test_reset_student_attempts_invalid_entrance_exam(self):\n        \"\"\" Test reset for invalid entrance exam. \"\"\"\n        url = reverse('reset_student_attempts_for_entrance_exam',\n                      kwargs={'course_id': unicode(self.course_with_invalid_ee.id)})\n        response = self.client.get(url, {\n            'unique_student_identifier': self.student.email,\n        })\n        self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
{"code": "def list_forum_members(request, course_id):\n    \"\"\"\n    Lists forum members of a certain rolename.\n    Limited to staff access.\n\n    The requesting user must be at least staff.\n    Staff forum admins can access all roles EXCEPT for FORUM_ROLE_ADMINISTRATOR\n        which is limited to instructors.\n\n    Takes query parameter `rolename`.\n    \"\"\"\n    course_id = SlashSeparatedCourseKey.from_deprecated_string(course_id)\n    course = get_course_by_id(course_id)\n    has_instructor_access = has_access(request.user, 'instructor', course)\n    has_forum_admin = has_forum_access(\n        request.user, course_id, FORUM_ROLE_ADMINISTRATOR\n    )\n\n    rolename = request.GET.get('rolename')\n\n    # default roles require either (staff & forum admin) or (instructor)\n    if not (has_forum_admin or has_instructor_access):\n        return HttpResponseBadRequest(\n            \"Operation requires staff & forum admin or instructor access\"\n        )\n\n    # EXCEPT FORUM_ROLE_ADMINISTRATOR requires (instructor)\n    if rolename == FORUM_ROLE_ADMINISTRATOR and not has_instructor_access:\n        return HttpResponseBadRequest(\"Operation requires instructor access.\")\n\n    # filter out unsupported for roles\n    if rolename not in [FORUM_ROLE_ADMINISTRATOR, FORUM_ROLE_MODERATOR, FORUM_ROLE_COMMUNITY_TA]:\n        return HttpResponseBadRequest(strip_tags(\n            \"Unrecognized rolename '{}'.\".format(rolename)\n        ))\n\n    try:\n        role = Role.objects.get(name=rolename, course_id=course_id)\n        users = role.users.all().order_by('username')\n    except Role.DoesNotExist:\n        users = []\n\n    def extract_user_info(user):\n        \"\"\" Convert user to dict for json rendering. \"\"\"\n        return {\n            'username': user.username,\n            'email': user.email,\n            'first_name': user.first_name,\n            'last_name': user.last_name,\n        }\n\n    response_payload = {\n        'course_id': course_id.to_deprecated_string(),\n        rolename: map(extract_user_info, users),\n    }\n    return JsonResponse(response_payload)", "label_name": "CWE-352", "label": 0}
{"code": "    def decorator(func):  # pylint: disable=missing-docstring\n        def wrapped(*args, **kwargs):  # pylint: disable=missing-docstring\n            request = args[0]\n\n            error_response_data = {\n                'error': 'Missing required query parameter(s)',\n                'parameters': [],\n                'info': {},\n            }\n\n            for (param, extra) in required_params:\n                default = object()\n                if request.GET.get(param, default) == default:\n                    error_response_data['parameters'].append(param)\n                    error_response_data['info'][param] = extra\n\n            if len(error_response_data['parameters']) > 0:\n                return JsonResponse(error_response_data, status=400)\n            else:\n                return func(*args, **kwargs)\n        return wrapped", "label_name": "CWE-352", "label": 0}
{"code": "    def test_file(self, tmpdir):\n        filename = tmpdir / 'foo'\n        filename.ensure()\n        url = QUrl.fromLocalFile(str(filename))\n        req = QNetworkRequest(url)\n        reply = filescheme.handler(req)\n        assert reply is None", "label_name": "CWE-352", "label": 0}
{"code": "  public void onSubmit()\n  {\n    final String sessionCsrfToken = getCsrfSessionToken();\n    final String postedCsrfToken = this.csrfTokenField.getInput();\n    if (StringUtils.equals(sessionCsrfToken, postedCsrfToken) == false) {\n      log.error(\"Cross site request forgery alert. csrf token doesn't match! session csrf token=\"\n          + sessionCsrfToken\n          + \", posted csrf token=\"\n          + postedCsrfToken);\n      throw new InternalErrorException(\"errorpage.csrfError\");\n    }\n  }", "label_name": "CWE-352", "label": 0}
{"code": "  public DropFileContainer(final String id, final String mimeType) {\n    super(id);\n    this.mimeType = mimeType;\n    main = new WebMarkupContainer(\"main\");\n    add(main);\n  }", "label_name": "CWE-352", "label": 0}
{"code": "    public void accessAllowed() {\n        expect(backend.isRemoteAccessAllowed(\"localhost\",\"127.0.0.1\")).andReturn(true);\n        replay(backend);\n\n        handler.checkClientIPAccess(\"localhost\",\"127.0.0.1\");\n    }", "label_name": "CWE-352", "label": 0}
{"code": "    public void handle(HttpExchange pExchange) throws IOException {\n        if (requestHandler == null) {\n            throw new IllegalStateException(\"Handler not yet started\");\n        }\n\n        JSONAware json = null;\n        URI uri = pExchange.getRequestURI();\n        ParsedUri parsedUri = new ParsedUri(uri,context);\n        try {\n            // Check access policy\n            InetSocketAddress address = pExchange.getRemoteAddress();\n            requestHandler.checkClientIPAccess(address.getHostName(),address.getAddress().getHostAddress());\n            String method = pExchange.getRequestMethod();\n\n            // Dispatch for the proper HTTP request method\n            if (\"GET\".equalsIgnoreCase(method)) {\n                setHeaders(pExchange);\n                json = executeGetRequest(parsedUri);\n            } else if (\"POST\".equalsIgnoreCase(method)) {\n                setHeaders(pExchange);\n                json = executePostRequest(pExchange, parsedUri);\n            } else if (\"OPTIONS\".equalsIgnoreCase(method)) {\n                performCorsPreflightCheck(pExchange);\n            } else {\n                throw new IllegalArgumentException(\"HTTP Method \" + method + \" is not supported.\");\n            }\n        } catch (Throwable exp) {\n            json = requestHandler.handleThrowable(\n                    exp instanceof RuntimeMBeanException ? ((RuntimeMBeanException) exp).getTargetException() : exp);\n        } finally {\n            sendResponse(pExchange,parsedUri,json);\n        }\n    }", "label_name": "CWE-352", "label": 0}
{"code": "    private static final RestrictorCheck CORS_CHECK = new RestrictorCheck() {\n        /** {@inheritDoc} */\n        public boolean check(Restrictor restrictor, Object... args) {\n            return restrictor.isCorsAccessAllowed((String) args[0]);\n        }\n    };", "label_name": "CWE-352", "label": 0}
{"code": "    public boolean isCorsAccessAllowed(String pOrigin) {\n        return checkRestrictorService(CORS_CHECK,pOrigin);\n    }", "label_name": "CWE-352", "label": 0}
{"code": "        public boolean isCorsAccessAllowed(String pOrigin) {\n            return cors;\n        }", "label_name": "CWE-352", "label": 0}
{"code": "    def initialize(session, config_classes, nodes, cluster_name)\n      @config_classes = config_classes\n      @nodes = nodes\n      @cluster_name = cluster_name\n      @session = session\n    end", "label_name": "CWE-384", "label": 1}
{"code": "    def send(force=false)\n      nodes_txt = @nodes.join(', ')\n      @configs.each { |cfg|\n        $logger.info(\n          \"Sending config '#{cfg.class.name}' version #{cfg.version} #{cfg.hash}\"\\\n          + \" to nodes: #{nodes_txt}\"\n        )\n      }\n\n      data = self.prepare_request_data(@configs, @cluster_name, force)\n      node_response = {}\n      threads = []\n      @nodes.each { |node|\n        threads << Thread.new {\n          code, out = send_request_with_token(\n            @session, node, 'set_configs', true, data, true, nil, 30,\n            @additional_tokens\n          )\n          if 200 == code\n            begin\n              node_response[node] = JSON.parse(out)\n            rescue JSON::ParserError\n            end\n          elsif 404 == code\n            node_response[node] = {'status' => 'not_supported'}\n          else\n            begin\n              response = JSON.parse(out)\n              if true == response['notauthorized'] or true == response['notoken']\n                node_response[node] = {'status' => 'notauthorized'}\n              end\n            rescue JSON::ParserError\n            end\n          end\n          if not node_response.key?(node)\n            node_response[node] = {'status' => 'error'}\n          end\n          # old pcsd returns this instead of 404 if pacemaker isn't running there\n          if node_response[node]['pacemaker_not_running']\n            node_response[node] = {'status' => 'not_supported'}\n          end\n        }\n      }\n      threads.each { |t| t.join }\n\n      node_response.each { |node, response|\n        $logger.info(\"Sending config response from #{node}: #{response}\")\n      }\n\n      return node_response\n    end", "label_name": "CWE-384", "label": 1}
{"code": "def remove_node(session, new_nodename, all=false)\n  if all\n    # we check for a quorum loss warning in remote_remove_nodes\n    out, stderror, retval = run_cmd(\n      session, PCS, \"cluster\", \"node\", \"remove\", new_nodename, \"--force\"\n    )\n  else\n    out, stderror, retval = run_cmd(\n      session, PCS, \"cluster\", \"localnode\", \"remove\", new_nodename\n    )\n  end\n  $logger.info(\"Removing #{new_nodename} from pcs_settings.conf\")\n  corosync_nodes = get_corosync_nodes()\n  pcs_config = PCSConfig.new(Cfgsync::PcsdSettings.from_file('{}').text())\n  pcs_config.update_cluster($cluster_name, corosync_nodes)\n  sync_config = Cfgsync::PcsdSettings.from_text(pcs_config.text())\n  # on version conflict just go on, config will be corrected eventually\n  # by displaying the cluster in the web UI\n  Cfgsync::save_sync_new_version(\n    sync_config, corosync_nodes, $cluster_name, true\n  )\n  return retval, out + stderror\nend", "label_name": "CWE-384", "label": 1}
{"code": "def remove_acl_permission(session, acl_perm_id)\n  stdout, stderror, retval = run_cmd(\n    session, PCS, \"acl\", \"permission\", \"delete\", acl_perm_id.to_s\n  )\n  if retval != 0\n    if stderror.empty?\n      return \"Error removing permission\"\n    else\n      return stderror.join(\"\\n\").strip\n    end\n  end\n  return \"\"\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_corosync_version()\n  begin\n    stdout, stderror, retval = run_cmd(\n      PCSAuth.getSuperuserSession, COROSYNC, \"-v\"\n    )\n  rescue\n    stdout = []\n  end\n  if retval == 0\n    match = /version\\D+(\\d+)\\.(\\d+)\\.(\\d+)/.match(stdout.join())\n    if match\n      return match[1..3].collect { | x | x.to_i }\n    end\n  end\n  return nil\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_cluster_name()\n  if ISRHEL6\n    stdout, stderror, retval = run_cmd(\n      PCSAuth.getSuperuserSession, COROSYNC_CMAPCTL, \"cluster\"\n    )\n    if retval == 0\n      stdout.each { |line|\n        match = /^cluster\\.name=(.*)$/.match(line)\n        return match[1] if match\n      }\n    end\n    begin\n      cluster_conf = Cfgsync::ClusterConf.from_file().text()\n    rescue\n      return ''\n    end\n    conf_dom = REXML::Document.new(cluster_conf)\n    if conf_dom.root and conf_dom.root.name == 'cluster'\n      return conf_dom.root.attributes['name']\n    end\n    return ''\n  end\n\n  stdout, stderror, retval = run_cmd(\n    PCSAuth.getSuperuserSession, COROSYNC_CMAPCTL, \"totem.cluster_name\"\n  )\n  if retval != 0 and not ISRHEL6\n    # Cluster probably isn't running, try to get cluster name from\n    # corosync.conf\n    begin\n      corosync_conf = CorosyncConf::parse_string(\n        Cfgsync::CorosyncConf.from_file().text()\n      )\n      # mimic corosync behavior - the last cluster_name found is used\n      cluster_name = nil\n      corosync_conf.sections('totem').each { |totem|\n        totem.attributes('cluster_name').each { |attrib|\n          cluster_name = attrib[1]\n        }\n      }\n      return cluster_name if cluster_name\n    rescue\n      return ''\n    end\n    return \"\"\n  else\n    return stdout.join().gsub(/.*= /,\"\").strip\n  end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def add_node_attr(session, node, key, value)\n  stdout, stderr, retval = run_cmd(\n    session, PCS, \"property\", \"set\", \"--node\", node, key.to_s + '=' + value.to_s\n  )\n  return retval\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_wizard(params, request, session)\n  if not allowed_for_local_cluster(session, Permissions::READ)\n    return 403, 'Permission denied'\n  end\n  wizard = PCSDWizard.getWizard(params[\"wizard\"])\n  if wizard != nil\n    return erb wizard.collection_page\n  else\n    return \"Error finding Wizard - #{params[\"wizard\"]}\"\n  end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def fence_device_form(params, request, session)\n  if not allowed_for_local_cluster(session, Permissions::READ)\n    return 403, 'Permission denied'\n  end\n\n  @cur_resource = get_resource_by_id(params[:resource], get_cib_dom(session))\n\n  if @cur_resource.instance_of?(ClusterEntity::Primitive) and @cur_resource.stonith\n    @resource_agents = getFenceAgents(session, @cur_resource.agentname)\n    @existing_resource = true\n    @fenceagent = @resource_agents[@cur_resource.type]\n    erb :fenceagentform\n  else\n    \"Can't find fence device\"\n  end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def resource_clone(params, request, session)\n  if not allowed_for_local_cluster(session, Permissions::WRITE)\n    return 403, 'Permission denied'\n  end\n\n  unless params[:resource_id]\n    return [400, 'resource_id has to be specified.']\n  end\n  \n  _, stderr, retval = run_cmd(\n    session, PCS, 'resource', 'clone', params[:resource_id]\n  )\n  if retval != 0\n    return [400, 'Unable to create clone resource from ' +\n      \"'#{params[:resource_id]}': #{stderr.join('')}\"\n    ]\n  end\n  return 200\nend", "label_name": "CWE-384", "label": 1}
{"code": "def remote_remove_nodes(params, request, session)\n  if not allowed_for_local_cluster(session, Permissions::FULL)\n    return 403, 'Permission denied'\n  end\n  count = 0\n  out = \"\"\n  node_list = []\n  options = []\n  while params[\"nodename-\" + count.to_s]\n    node_list << params[\"nodename-\" + count.to_s]\n    count = count + 1\n  end\n  options << \"--force\" if params[\"force\"]\n\n  cur_node = get_current_node_name()\n  if i = node_list.index(cur_node)\n    node_list.push(node_list.delete_at(i))\n  end\n\n  # stop the nodes at once in order to:\n  # - prevent resources from moving pointlessly\n  # - get possible quorum loss warning\n  stop_params = node_list + options\n  stdout, stderr, retval = run_cmd(\n    session, PCS, \"cluster\", \"stop\", *stop_params\n  )\n  if retval != 0\n    return [400, stderr.join]\n  end\n\n  node_list.each {|node|\n    retval, output = remove_node(session, node, true)\n    out = out + output.join(\"\\n\")\n  }\n  config = PCSConfig.new(Cfgsync::PcsdSettings.from_file('{}').text())\n  if config.get_nodes($cluster_name) == nil or config.get_nodes($cluster_name).length == 0\n    return [200,\"No More Nodes\"]\n  end\n  return out\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_sw_versions(params, request, session)\n  versions = {\n    \"rhel\" => get_rhel_version(),\n    \"pcs\" => get_pcsd_version(),\n    \"pacemaker\" => get_pacemaker_version(),\n    \"corosync\" => get_corosync_version(),\n    \"cman\" => get_cman_version(),\n  }\n  return JSON.generate(versions)\nend", "label_name": "CWE-384", "label": 1}
{"code": "def set_node_utilization(params, reqest, session)\n  unless allowed_for_local_cluster(session, Permissions::WRITE)\n    return 403, 'Permission denied'\n  end\n\n  unless params[:node] and params[:name]\n    return 400, 'node and name are required'\n  end\n\n  node = params[:node]\n  name = params[:name]\n  value = params[:value] || ''\n\n  _, stderr, retval = run_cmd(\n    session, PCS, 'node', 'utilization', node, \"#{name}=#{value}\"\n  )\n\n  if retval != 0\n    return [400, \"Unable to set utilization '#{name}=#{value}' for node \" +\n      \"'#{res_id}': #{stderr.join('')}\"\n    ]\n  end\n  return 200\nend", "label_name": "CWE-384", "label": 1}
{"code": "def resource_start(params, request, session)\n  if not allowed_for_local_cluster(session, Permissions::WRITE)\n    return 403, 'Permission denied'\n  end\n  stdout, stderr, retval = run_cmd(\n    session, PCS, \"resource\", \"enable\", params[:resource]\n  )\n  if retval == 0\n    return JSON.generate({\"success\" => \"true\"})\n  else\n    return JSON.generate({\"error\" => \"true\", \"stdout\" => stdout, \"stderror\" => stderr})\n  end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def cluster_destroy(params, request, session)\n  if not allowed_for_local_cluster(session, Permissions::FULL)\n    return 403, 'Permission denied'\n  end\n  out, errout, retval = run_cmd(session, PCS, \"cluster\", \"destroy\")\n  if retval == 0\n    return [200, \"Successfully destroyed cluster\"]\n  else\n    return [400, \"Error destroying cluster:\\n#{out}\\n#{errout}\\n#{retval}\\n\"]\n  end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def remote_pcsd_restart(params, request, session)\n  pcsd_restart()\n  return [200, 'success']\nend", "label_name": "CWE-384", "label": 1}
{"code": "export async function formParse(req: any): Promise<FormParseResult> {\n\t// It's not clear how to get mocked requests to be parsed successfully by\n\t// formidable so we use this small hack. If it's mocked, we are running test\n\t// units and the request body is already an object and can be returned.\n\tif (req.__isMocked) {\n\t\tconst output: any = {};\n\t\tif (req.files) output.files = req.files;\n\t\toutput.fields = req.body || {};\n\t\treturn output;\n\t}\n\n\t// Note that for Formidable to work, the content-type must be set in the\n\t// headers\n\treturn new Promise((resolve: Function, reject: Function) => {\n\t\tconst form = formidable({ multiples: true });\n\t\tform.parse(req, (error: any, fields: any, files: any) => {\n\t\t\tif (error) {\n\t\t\t\treject(error);\n\t\t\t\treturn;\n\t\t\t}\n\n\t\t\tresolve({ fields, files });\n\t\t});\n\t});\n}", "label_name": "CWE-352", "label": 0}