cwe-compound-group / test.jsonl
mcanoglu's picture
Upload 3 files
5e5d5e0 verified
raw
history blame
No virus
39.8 kB
{"code": "\t\tfunction uninstallPage()\n\t\t{\n\t\t\t$id = $this->getId();\n\n\t\t\tif(empty($_POST['uninstall_confirm']))\n\t\t\t{\n\n\t\t\t\t$plug_vars = e107::getPlug()->load($id)->getMeta();\n\n\t\t\t\t$name = e107::getPlug()->getName();\n\t\t\t\t$this->addTitle(EPL_ADLAN_63);\n\t\t\t\t$this->addTitle($name);\n\n\t\t\t\treturn $this->pluginConfirmUninstall($plug_vars);\n\t\t\t}\n\n\t\t\t$post = e107::getParser()->filter($_POST);\n\n\n\n\t\t//\t$id = e107::getPlugin\n\n\t\t\t$text = e107::getPlugin()->uninstall($id, $post);\n\n\t\t\te107::getMessage()->add($text, E_MESSAGE_SUCCESS);\n\t\t\t$log = e107::getPlugin()->getLog();\n\t\t\te107::getDebug()->log($log);\n\n\t\t\t$this->redirectAction('list');\n\t\t}", "label_name": "CWE-352", "label": 0}
{"code": " function restart($sMessage = '')\n {\n $_COOKIE['sessionID'] = phpAds_SessionStart();\n OA_Auth::displayLogin($sMessage, $_COOKIE['sessionID']);\n }", "label_name": "CWE-384", "label": 1}
{"code": "function select_atversion(){ \n global $sort_versions;\n $menu = '<form action=\"'.$_SERVER['PHP_SELF'].'\" method=\"post\">'; \n $menu.= '<select name=\"atversions\">';\n $menu.= '<option value=\"0\">'._AT(\"all\").'</option>';\n foreach($sort_versions as $version){\n if($version == VERSION){\n $menu .= '<option value=\"'.$version.'\" selected=\"selected\">'.$version.'</option>';\n }else{\n $menu .= '<option value=\"'.$version.'\" >'.$version.'</option>';\n }\n }\n $menu .='</select>';\n $menu .='<input type=\"submit\" value=\"'. _AT('filter').'\"/></form>';\n return $menu;\n}", "label_name": "CWE-352", "label": 0}
{"code": " public static function dropdown($vars) {\n if(is_array($vars)){\n //print_r($vars);\n $name = $vars['name'];\n $where = \"WHERE \";\n if(isset($vars['parent'])) {\n $where .= \" `parent` = '{$vars['parent']}' \";\n }else{\n $where .= \"1 \";\n }\n $order_by = \"ORDER BY \";\n if(isset($vars['order_by'])) {\n $order_by .= \" {$vars['order_by']} \";\n }else{\n $order_by .= \" `name` \";\n }\n if (isset($vars['sort'])) {\n $sort = \" {$vars['sort']}\";\n }\n }\n $cat = Db::result(\"SELECT * FROM `cat` {$where} {$order_by} {$sort}\");\n $drop = \"<select name=\\\"{$name}\\\" class=\\\"form-control\\\"><option></option>\";\n if(Db::$num_rows > 0 ){\n foreach ($cat as $c) {\n # code...\n if($c->parent == ''){\n if(isset($vars['selected']) && $c->id == $vars['selected']) $sel = \"SELECTED\"; else $sel = \"\";\n $drop .= \"<option value=\\\"{$c->id}\\\" $sel style=\\\"padding-left: 10px;\\\">{$c->name}</option>\";\n foreach ($cat as $c2) {\n # code...\n if($c2->parent == $c->id){\n if(isset($vars['selected']) && $c2->id == $vars['selected']) $sel = \"SELECTED\"; else $sel = \"\";\n $drop .= \"<option value=\\\"{$c2->id}\\\" $sel style=\\\"padding-left: 10px;\\\">&nbsp;&nbsp;&nbsp;{$c2->name}</option>\";\n }\n }\n }\n \n }\n }\n $drop .= \"</select>\";\n\n return $drop;\n }", "label_name": "CWE-352", "label": 0}
{"code": " self::$mysqli = new mysqli(DB_HOST, DB_USER, DB_PASS, DB_NAME);\n return self::$mysqli;\n }\n }", "label_name": "CWE-352", "label": 0}
{"code": " public static function makeConfig ($file) {\n $config = \"<?php if(!defined('GX_LIB')) die(\\\"Direct Access Not Allowed!\\\");\n/**\n* GeniXCMS - Content Management System\n* \n* PHP Based Content Management System and Framework\n*\n* @package GeniXCMS\n* @since 0.0.1 build date 20140925\n* @version 0.0.1\n* @link https://github.com/semplon/GeniXCMS\n* @author Puguh Wijayanto (www.metalgenix.com)\n* @copyright 2014-2015 Puguh Wijayanto\n* @license http://www.opensource.org/licenses/mit-license.php MIT\n*\n*/\n\n// DB CONFIG\ndefine('DB_HOST', '\".Session::val('dbhost').\"');\ndefine('DB_NAME', '\".Session::val('dbname').\"');\ndefine('DB_PASS', '\".Session::val('dbpass').\"');\ndefine('DB_USER', '\".Session::val('dbuser').\"');\ndefine('DB_DRIVER', 'mysqli');\n\n\ndefine('THEME', 'default');\ndefine('GX_LANG', 'english');\ndefine('SMART_URL', false); //set 'true' if you want use SMART URL (SEO Friendly URL)\ndefine('GX_URL_PREFIX', '.html');\ndefine('SECURITY', '\".Typo::getToken(200).\"'); // for security purpose, will be used for creating password\n\n \";\n try{\n $f = fopen($file, \"w\");\n $c = fwrite($f, $config);\n fclose($f);\n }catch (Exception $e) {\n echo $e->getMessage();\n }\n \n return $config;\n }", "label_name": "CWE-352", "label": 0}
{"code": " $data .= '<input type=\"hidden\" name=\"'.htmlspecialchars($key).'\" value=\"'.htmlspecialchars($value).'\" />';\n }\n echo \"<html><head><title>CSRF check failed</title></head>\n <body>\n <p>CSRF check failed. Your form session may have expired, or you may not have\n cookies enabled.</p>\n <form method='post' action=''>$data<input type='submit' value='Try again' /></form>\n <p>Debug: $tokens</p></body></html>\n\";\n}", "label_name": "CWE-352", "label": 0}
{"code": " public function delete(){\n $cat_id = I(\"cat_id/d\")? I(\"cat_id/d\") : 0;\n $cat = D(\"Catalog\")->where(\" cat_id = '$cat_id' \")->find();\n $item_id = $cat['item_id'];\n \n $login_user = $this->checkLogin();\n if (!$this->checkItemEdit($login_user['uid'] , $item_id)) {\n $return['error_code'] = -1 ;\n $return['error_message'] = L('no_permissions');\n $this->sendResult($return);\n return;\n }\n\n if ($cat_id > 0 ) {\n \n $ret = D(\"Catalog\")->deleteCat($cat_id);\n\n }\n if ($ret) {\n $this->sendResult($ret);\n }else{\n $return['error_code'] = -1 ;\n $return['error_message'] = 'request fail' ;\n $this->sendResult($return);\n }\n }", "label_name": "CWE-352", "label": 0}
{"code": "\tpublic static function GetNewTransactionId()\n\t{\n\t\tif (!is_dir(APPROOT.'data/transactions'))\n\t\t{\n\t\t\tif (!is_writable(APPROOT.'data'))\n\t\t\t{\n\t\t\t\tthrow new Exception('The directory \"'.APPROOT.'data\" must be writable to the application.');\n\t\t\t}\n\t\t\t/** @noinspection MkdirRaceConditionInspection */\n\t\t\tif (!@mkdir(APPROOT.'data/transactions'))\n\t\t\t{\n\t\t\t\tthrow new Exception('Failed to create the directory \"'.APPROOT.'data/transactions\". Ajust the rights on the parent directory or let an administrator create the transactions directory and give the web sever enough rights to write into it.');\n\t\t\t}\n\t\t}\n\t\tif (!is_writable(APPROOT.'data/transactions'))\n\t\t{\n\t\t\tthrow new Exception('The directory \"'.APPROOT.'data/transactions\" must be writable to the application.');\n\t\t}\n\t\tself::CleanupOldTransactions();\n\t\t$id = basename(tempnam(APPROOT.'data/transactions', static::GetUserPrefix()));\n\t\tself::Info('GetNewTransactionId: Created transaction: '.$id);\n\n\t\treturn (string)$id;\n\t}", "label_name": "CWE-352", "label": 0}
{"code": "\tpublic static function IsTransactionValid($id, $bRemoveTransaction = true)\n\t{\n\t\t// Constraint the transaction file within APPROOT.'data/transactions'\n\t\t$sTransactionDir = realpath(APPROOT.'data/transactions');\n\t\t$sFilepath = utils::RealPath($sTransactionDir.'/'.$id, $sTransactionDir);\n\t\tif (($sFilepath === false) || (strlen($sTransactionDir) == strlen($sFilepath)))\n\t\t{\n\t\t\treturn false;\n\t\t}\n\n\t\tclearstatcache(true, $sFilepath);\n\t\t$bResult = file_exists($sFilepath);\n\t\tif ($bResult)\n\t\t{\n\t\t\tif ($bRemoveTransaction)\n\t\t\t{\n\t\t\t\t$bResult = @unlink($sFilepath);\n\t\t\t\tif (!$bResult)\n\t\t\t\t{\n\t\t\t\t\tself::Error('IsTransactionValid: FAILED to remove transaction '.$id);\n\t\t\t\t}\n\t\t\t\telse\n\t\t\t\t{\n\t\t\t\t\tself::Info('IsTransactionValid: OK. Removed transaction: '.$id);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\telse\n\t\t{\n\t\t\tself::Info(\"IsTransactionValid: Transaction '$id' not found. Pending transactions for this user:\\n\".implode(\"\\n\", self::GetPendingTransactions()));\n\t\t}\n\t\treturn $bResult;\n\t}", "label_name": "CWE-352", "label": 0}
{"code": "\t\t\t\t$this->doDelete( $type, $dump );\n\t\t\t}\n\t\t}\n\n\t\t$pager = new DataDumpPager( $this->getContext(), $this->getPageTitle() );\n\n\t\t$out->addModuleStyles( 'mediawiki.special' );\n\n\t\t$pager->getForm();\n\t\t$out->addParserOutputContent( $pager->getFullOutput() );\n\t}", "label_name": "CWE-352", "label": 0}
{"code": " public function setPassword(Request $request, string $token)\n {\n $this->validate($request, [\n 'password' => ['required', 'min:8'],\n ]);\n\n try {\n $userId = $this->inviteService->checkTokenAndGetUserId($token);\n } catch (Exception $exception) {\n return $this->handleTokenException($exception);\n }\n\n $user = $this->userRepo->getById($userId);\n $user->password = bcrypt($request->get('password'));\n $user->email_confirmed = true;\n $user->save();\n\n $this->inviteService->deleteByUser($user);\n $this->showSuccessNotification(trans('auth.user_invite_success', ['appName' => setting('app-name')]));\n $this->loginService->login($user, auth()->getDefaultDriver());\n\n return redirect('/');\n }", "label_name": "CWE-352", "label": 0}
{"code": " public function buildView(FormView $view, FormInterface $form, array $options)\n {\n if (!isset($options['api_data'])) {\n return;\n }\n\n $apiData = $options['api_data'];\n\n if (!\\is_array($apiData)) {\n throw new \\InvalidArgumentException('Option \"api_data\" must be an array for form \"' . $form->getName() . '\"');\n }\n\n if (!isset($apiData['select'])) {\n return;\n }\n\n if (!isset($apiData['route'])) {\n throw new \\InvalidArgumentException('Missing \"route\" option for \"api_data\" option for form \"' . $form->getName() . '\"');\n }\n\n if (!isset($apiData['route_params'])) {\n $apiData['route_params'] = [];\n }\n\n $formPrefixes = [];\n $parent = $form->getParent();\n do {\n $formPrefixes[] = $parent->getName();\n } while (($parent = $parent->getParent()) !== null);\n\n $formPrefix = implode('_', array_reverse($formPrefixes));\n\n $formField = $formPrefix . '_' . $apiData['select'];\n\n $view->vars['attr'] = array_merge($view->vars['attr'], [\n 'data-form-prefix' => $formPrefix,\n 'data-related-select' => $formField,\n 'data-api-url' => $this->router->generate($apiData['route'], $apiData['route_params']),\n ]);\n\n if (isset($apiData['empty_route_params'])) {\n $view->vars['attr'] = array_merge($view->vars['attr'], [\n 'data-empty-url' => $this->router->generate($apiData['route'], $apiData['empty_route_params']),\n ]);\n }\n }", "label_name": "CWE-352", "label": 0}
{"code": "rcube_webmail.prototype.enigma_export = function(selected)\n{\n var keys = selected ? this.keys_list.get_selection().join(',') : '*';\n\n if (!keys.length)\n return;\n\n this.goto_url('plugin.enigmakeys', {_a: 'export', _keys: keys});\n};", "label_name": "CWE-352", "label": 0}
{"code": "\tdeleteTheme: function() {\n\t\treturn confirm( themes.data.settings.confirmDelete );\n\t},", "label_name": "CWE-352", "label": 0}
{"code": "\twp.updates.beforeunload = function() {\n\t\tif ( wp.updates.updateLock ) {\n\t\t\treturn wp.updates.l10n.beforeunload;\n\t\t}\n\t};", "label_name": "CWE-352", "label": 0}
{"code": "\twp.updates.credentialError = function( response, type ) {\n\t\twp.updates.updateQueue.push( {\n\t\t\t'type': type,\n\t\t\t'data': {\n\t\t\t\t// Not cool that we're depending on response for this data.\n\t\t\t\t// This would feel more whole in a view all tied together.\n\t\t\t\tplugin: response.plugin,\n\t\t\t\tslug: response.slug\n\t\t\t}\n\t\t} );\n\t\twp.updates.showErrorInCredentialsForm( response.error );\n\t\twp.updates.requestFilesystemCredentials();\n\t};", "label_name": "CWE-352", "label": 0}
{"code": " success:function (data, textStatus) {\n showMessage('success', 'Homepage set.');\n $('#setHomePage').addClass('orange');\n },", "label_name": "CWE-352", "label": 0}
{"code": "function checkAddingNode(){\n var nodeName = $(\"#add_node\").children(\"form\").find(\"[name='new_nodename']\").val().trim();\n if (nodeName == \"\") {\n $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n return false;\n }\n\n $.ajax({\n type: 'GET',\n url: '/manage/check_pcsd_status',\n data: {\"nodes\": nodeName},\n timeout: pcs_timeout,\n success: function (data) {\n var mydata = jQuery.parseJSON(data);\n if (mydata[nodeName] == \"Unable to authenticate\") {\n auth_nodes_dialog([nodeName], function(){$(\"#add_node_submit_btn\").trigger(\"click\");});\n $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n } else if (mydata[nodeName] == \"Offline\") {\n alert(\"Unable to contact node '\" + nodeName + \"'\");\n $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n } else {\n create_node($(\"#add_node\").children(\"form\"));\n }\n },\n error: function (XMLHttpRequest, textStatus, errorThrown) {\n alert(\"ERROR: Unable to contact server\");\n $(\"#add_node_submit_btn\").button(\"option\", \"disabled\", false);\n }\n });\n}", "label_name": "CWE-384", "label": 1}
{"code": " $scope.initialize = function(customHandler) {\n var value = $cookies.get('requisitions_page_size');\n if (value) {\n $scope.pageSize = value;\n }\n growl.success('Retrieving requisition ' + $scope.foreignSource + '...');\n RequisitionsService.getRequisition($scope.foreignSource).then(\n function(requisition) { // success\n $scope.requisition = requisition;\n $scope.filteredNodes = requisition.nodes;\n $scope.updateFilteredNodes();\n if (customHandler) {\n customHandler();\n }\n },\n $scope.errorHandler\n );\n };", "label_name": "CWE-352", "label": 0}
{"code": " this.changeUserSettings = function(attr,value){\n \t$.get(this.wwwDir+ 'user/setsettingajax/'+attr+'/'+value);\n };", "label_name": "CWE-352", "label": 0}
{"code": " def test_reset_student_attempts_delete(self):\n \"\"\" Test delete single student state. \"\"\"\n url = reverse('reset_student_attempts', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': self.problem_urlname,\n 'unique_student_identifier': self.student.email,\n 'delete_module': True,\n })\n self.assertEqual(response.status_code, 200)\n # make sure the module has been deleted\n self.assertEqual(\n StudentModule.objects.filter(\n student=self.module_to_reset.student,\n course_id=self.module_to_reset.course_id,\n # module_id=self.module_to_reset.module_id,\n ).count(),\n 0\n )", "label_name": "CWE-352", "label": 0}
{"code": " def test_list_email_content_error(self, task_history_request):\n \"\"\" Test handling of error retrieving email \"\"\"\n invalid_task = FakeContentTask(0, 0, 0, 'test')\n invalid_task.make_invalid_input()\n task_history_request.return_value = [invalid_task]\n url = reverse('list_email_content', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {})\n self.assertEqual(response.status_code, 200)\n\n self.assertTrue(task_history_request.called)\n returned_email_info = json.loads(response.content)['emails']\n self.assertEqual(len(returned_email_info), 1)\n returned_info = returned_email_info[0]\n for info in ['created', 'sent_to', 'email', 'number_sent', 'requester']:\n self.assertEqual(returned_info[info], None)", "label_name": "CWE-352", "label": 0}
{"code": " def test_rescore_entrance_exam_with_invalid_exam(self):\n \"\"\" Test course has entrance exam id set while re-scoring. \"\"\"\n url = reverse('rescore_entrance_exam', kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
{"code": " def test_get_students_who_may_enroll(self):\n \"\"\"\n Test whether get_students_who_may_enroll returns an appropriate\n status message when users request a CSV file of students who\n may enroll in a course.\n \"\"\"\n url = reverse(\n 'get_students_who_may_enroll',\n kwargs={'course_id': unicode(self.course.id)}\n )\n # Successful case:\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n self.assertIn('status', res_json)\n self.assertNotIn('currently being created', res_json['status'])\n # CSV generation already in progress:\n with patch('instructor_task.api.submit_calculate_may_enroll_csv') as submit_task_function:\n error = AlreadyRunningError()\n submit_task_function.side_effect = error\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n self.assertIn('status', res_json)\n self.assertIn('currently being created', res_json['status'])", "label_name": "CWE-352", "label": 0}
{"code": " def test_get_sale_records_features_csv(self):\n \"\"\"\n Test that the response from get_sale_records is in csv format.\n \"\"\"\n for i in range(2):\n course_registration_code = CourseRegistrationCode(\n code='sale_invoice{}'.format(i),\n course_id=self.course.id.to_deprecated_string(),\n created_by=self.instructor,\n invoice=self.sale_invoice_1,\n invoice_item=self.invoice_item,\n mode_slug='honor'\n )\n course_registration_code.save()\n\n url = reverse(\n 'get_sale_records',\n kwargs={'course_id': self.course.id.to_deprecated_string()}\n )\n response = self.client.get(url + '/csv', {})\n self.assertEqual(response['Content-Type'], 'text/csv')", "label_name": "CWE-352", "label": 0}
{"code": " def test_modify_access_revoke(self):\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.other_staff.email,\n 'rolename': 'staff',\n 'action': 'revoke',\n })\n self.assertEqual(response.status_code, 200)", "label_name": "CWE-352", "label": 0}
{"code": " def get_email_content_response(self, num_emails, task_history_request, with_failures=False):\n \"\"\" Calls the list_email_content endpoint and returns the repsonse \"\"\"\n self.setup_fake_email_info(num_emails, with_failures)\n task_history_request.return_value = self.tasks.values()\n url = reverse('list_email_content', kwargs={'course_id': self.course.id.to_deprecated_string()})\n with patch('instructor.views.api.CourseEmail.objects.get') as mock_email_info:\n mock_email_info.side_effect = self.get_matching_mock_email\n response = self.client.get(url, {})\n self.assertEqual(response.status_code, 200)\n return response", "label_name": "CWE-352", "label": 0}
{"code": " def test_get_student_progress_url(self):\n \"\"\" Test that progress_url is in the successful response. \"\"\"\n url = reverse('get_student_progress_url', kwargs={'course_id': self.course.id.to_deprecated_string()})\n url += \"?unique_student_identifier={}\".format(\n quote(self.students[0].email.encode(\"utf-8\"))\n )\n response = self.client.get(url)\n self.assertEqual(response.status_code, 200)\n res_json = json.loads(response.content)\n self.assertIn('progress_url', res_json)", "label_name": "CWE-352", "label": 0}
{"code": " def test_reset_student_attempts_invalid_entrance_exam(self):\n \"\"\" Test reset for invalid entrance exam. \"\"\"\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course_with_invalid_ee.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
{"code": "def list_forum_members(request, course_id):\n \"\"\"\n Lists forum members of a certain rolename.\n Limited to staff access.\n\n The requesting user must be at least staff.\n Staff forum admins can access all roles EXCEPT for FORUM_ROLE_ADMINISTRATOR\n which is limited to instructors.\n\n Takes query parameter `rolename`.\n \"\"\"\n course_id = SlashSeparatedCourseKey.from_deprecated_string(course_id)\n course = get_course_by_id(course_id)\n has_instructor_access = has_access(request.user, 'instructor', course)\n has_forum_admin = has_forum_access(\n request.user, course_id, FORUM_ROLE_ADMINISTRATOR\n )\n\n rolename = request.GET.get('rolename')\n\n # default roles require either (staff & forum admin) or (instructor)\n if not (has_forum_admin or has_instructor_access):\n return HttpResponseBadRequest(\n \"Operation requires staff & forum admin or instructor access\"\n )\n\n # EXCEPT FORUM_ROLE_ADMINISTRATOR requires (instructor)\n if rolename == FORUM_ROLE_ADMINISTRATOR and not has_instructor_access:\n return HttpResponseBadRequest(\"Operation requires instructor access.\")\n\n # filter out unsupported for roles\n if rolename not in [FORUM_ROLE_ADMINISTRATOR, FORUM_ROLE_MODERATOR, FORUM_ROLE_COMMUNITY_TA]:\n return HttpResponseBadRequest(strip_tags(\n \"Unrecognized rolename '{}'.\".format(rolename)\n ))\n\n try:\n role = Role.objects.get(name=rolename, course_id=course_id)\n users = role.users.all().order_by('username')\n except Role.DoesNotExist:\n users = []\n\n def extract_user_info(user):\n \"\"\" Convert user to dict for json rendering. \"\"\"\n return {\n 'username': user.username,\n 'email': user.email,\n 'first_name': user.first_name,\n 'last_name': user.last_name,\n }\n\n response_payload = {\n 'course_id': course_id.to_deprecated_string(),\n rolename: map(extract_user_info, users),\n }\n return JsonResponse(response_payload)", "label_name": "CWE-352", "label": 0}
{"code": " def decorator(func): # pylint: disable=missing-docstring\n def wrapped(*args, **kwargs): # pylint: disable=missing-docstring\n request = args[0]\n\n error_response_data = {\n 'error': 'Missing required query parameter(s)',\n 'parameters': [],\n 'info': {},\n }\n\n for (param, extra) in required_params:\n default = object()\n if request.GET.get(param, default) == default:\n error_response_data['parameters'].append(param)\n error_response_data['info'][param] = extra\n\n if len(error_response_data['parameters']) > 0:\n return JsonResponse(error_response_data, status=400)\n else:\n return func(*args, **kwargs)\n return wrapped", "label_name": "CWE-352", "label": 0}
{"code": " def test_file(self, tmpdir):\n filename = tmpdir / 'foo'\n filename.ensure()\n url = QUrl.fromLocalFile(str(filename))\n req = QNetworkRequest(url)\n reply = filescheme.handler(req)\n assert reply is None", "label_name": "CWE-352", "label": 0}
{"code": " public void onSubmit()\n {\n final String sessionCsrfToken = getCsrfSessionToken();\n final String postedCsrfToken = this.csrfTokenField.getInput();\n if (StringUtils.equals(sessionCsrfToken, postedCsrfToken) == false) {\n log.error(\"Cross site request forgery alert. csrf token doesn't match! session csrf token=\"\n + sessionCsrfToken\n + \", posted csrf token=\"\n + postedCsrfToken);\n throw new InternalErrorException(\"errorpage.csrfError\");\n }\n }", "label_name": "CWE-352", "label": 0}
{"code": " public DropFileContainer(final String id, final String mimeType) {\n super(id);\n this.mimeType = mimeType;\n main = new WebMarkupContainer(\"main\");\n add(main);\n }", "label_name": "CWE-352", "label": 0}
{"code": " public void accessAllowed() {\n expect(backend.isRemoteAccessAllowed(\"localhost\",\"127.0.0.1\")).andReturn(true);\n replay(backend);\n\n handler.checkClientIPAccess(\"localhost\",\"127.0.0.1\");\n }", "label_name": "CWE-352", "label": 0}
{"code": " public void handle(HttpExchange pExchange) throws IOException {\n if (requestHandler == null) {\n throw new IllegalStateException(\"Handler not yet started\");\n }\n\n JSONAware json = null;\n URI uri = pExchange.getRequestURI();\n ParsedUri parsedUri = new ParsedUri(uri,context);\n try {\n // Check access policy\n InetSocketAddress address = pExchange.getRemoteAddress();\n requestHandler.checkClientIPAccess(address.getHostName(),address.getAddress().getHostAddress());\n String method = pExchange.getRequestMethod();\n\n // Dispatch for the proper HTTP request method\n if (\"GET\".equalsIgnoreCase(method)) {\n setHeaders(pExchange);\n json = executeGetRequest(parsedUri);\n } else if (\"POST\".equalsIgnoreCase(method)) {\n setHeaders(pExchange);\n json = executePostRequest(pExchange, parsedUri);\n } else if (\"OPTIONS\".equalsIgnoreCase(method)) {\n performCorsPreflightCheck(pExchange);\n } else {\n throw new IllegalArgumentException(\"HTTP Method \" + method + \" is not supported.\");\n }\n } catch (Throwable exp) {\n json = requestHandler.handleThrowable(\n exp instanceof RuntimeMBeanException ? ((RuntimeMBeanException) exp).getTargetException() : exp);\n } finally {\n sendResponse(pExchange,parsedUri,json);\n }\n }", "label_name": "CWE-352", "label": 0}
{"code": " private static final RestrictorCheck CORS_CHECK = new RestrictorCheck() {\n /** {@inheritDoc} */\n public boolean check(Restrictor restrictor, Object... args) {\n return restrictor.isCorsAccessAllowed((String) args[0]);\n }\n };", "label_name": "CWE-352", "label": 0}
{"code": " public boolean isCorsAccessAllowed(String pOrigin) {\n return checkRestrictorService(CORS_CHECK,pOrigin);\n }", "label_name": "CWE-352", "label": 0}
{"code": " public boolean isCorsAccessAllowed(String pOrigin) {\n return cors;\n }", "label_name": "CWE-352", "label": 0}
{"code": " def initialize(session, config_classes, nodes, cluster_name)\n @config_classes = config_classes\n @nodes = nodes\n @cluster_name = cluster_name\n @session = session\n end", "label_name": "CWE-384", "label": 1}
{"code": " def send(force=false)\n nodes_txt = @nodes.join(', ')\n @configs.each { |cfg|\n $logger.info(\n \"Sending config '#{cfg.class.name}' version #{cfg.version} #{cfg.hash}\"\\\n + \" to nodes: #{nodes_txt}\"\n )\n }\n\n data = self.prepare_request_data(@configs, @cluster_name, force)\n node_response = {}\n threads = []\n @nodes.each { |node|\n threads << Thread.new {\n code, out = send_request_with_token(\n @session, node, 'set_configs', true, data, true, nil, 30,\n @additional_tokens\n )\n if 200 == code\n begin\n node_response[node] = JSON.parse(out)\n rescue JSON::ParserError\n end\n elsif 404 == code\n node_response[node] = {'status' => 'not_supported'}\n else\n begin\n response = JSON.parse(out)\n if true == response['notauthorized'] or true == response['notoken']\n node_response[node] = {'status' => 'notauthorized'}\n end\n rescue JSON::ParserError\n end\n end\n if not node_response.key?(node)\n node_response[node] = {'status' => 'error'}\n end\n # old pcsd returns this instead of 404 if pacemaker isn't running there\n if node_response[node]['pacemaker_not_running']\n node_response[node] = {'status' => 'not_supported'}\n end\n }\n }\n threads.each { |t| t.join }\n\n node_response.each { |node, response|\n $logger.info(\"Sending config response from #{node}: #{response}\")\n }\n\n return node_response\n end", "label_name": "CWE-384", "label": 1}
{"code": "def remove_node(session, new_nodename, all=false)\n if all\n # we check for a quorum loss warning in remote_remove_nodes\n out, stderror, retval = run_cmd(\n session, PCS, \"cluster\", \"node\", \"remove\", new_nodename, \"--force\"\n )\n else\n out, stderror, retval = run_cmd(\n session, PCS, \"cluster\", \"localnode\", \"remove\", new_nodename\n )\n end\n $logger.info(\"Removing #{new_nodename} from pcs_settings.conf\")\n corosync_nodes = get_corosync_nodes()\n pcs_config = PCSConfig.new(Cfgsync::PcsdSettings.from_file('{}').text())\n pcs_config.update_cluster($cluster_name, corosync_nodes)\n sync_config = Cfgsync::PcsdSettings.from_text(pcs_config.text())\n # on version conflict just go on, config will be corrected eventually\n # by displaying the cluster in the web UI\n Cfgsync::save_sync_new_version(\n sync_config, corosync_nodes, $cluster_name, true\n )\n return retval, out + stderror\nend", "label_name": "CWE-384", "label": 1}
{"code": "def remove_acl_permission(session, acl_perm_id)\n stdout, stderror, retval = run_cmd(\n session, PCS, \"acl\", \"permission\", \"delete\", acl_perm_id.to_s\n )\n if retval != 0\n if stderror.empty?\n return \"Error removing permission\"\n else\n return stderror.join(\"\\n\").strip\n end\n end\n return \"\"\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_corosync_version()\n begin\n stdout, stderror, retval = run_cmd(\n PCSAuth.getSuperuserSession, COROSYNC, \"-v\"\n )\n rescue\n stdout = []\n end\n if retval == 0\n match = /version\\D+(\\d+)\\.(\\d+)\\.(\\d+)/.match(stdout.join())\n if match\n return match[1..3].collect { | x | x.to_i }\n end\n end\n return nil\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_cluster_name()\n if ISRHEL6\n stdout, stderror, retval = run_cmd(\n PCSAuth.getSuperuserSession, COROSYNC_CMAPCTL, \"cluster\"\n )\n if retval == 0\n stdout.each { |line|\n match = /^cluster\\.name=(.*)$/.match(line)\n return match[1] if match\n }\n end\n begin\n cluster_conf = Cfgsync::ClusterConf.from_file().text()\n rescue\n return ''\n end\n conf_dom = REXML::Document.new(cluster_conf)\n if conf_dom.root and conf_dom.root.name == 'cluster'\n return conf_dom.root.attributes['name']\n end\n return ''\n end\n\n stdout, stderror, retval = run_cmd(\n PCSAuth.getSuperuserSession, COROSYNC_CMAPCTL, \"totem.cluster_name\"\n )\n if retval != 0 and not ISRHEL6\n # Cluster probably isn't running, try to get cluster name from\n # corosync.conf\n begin\n corosync_conf = CorosyncConf::parse_string(\n Cfgsync::CorosyncConf.from_file().text()\n )\n # mimic corosync behavior - the last cluster_name found is used\n cluster_name = nil\n corosync_conf.sections('totem').each { |totem|\n totem.attributes('cluster_name').each { |attrib|\n cluster_name = attrib[1]\n }\n }\n return cluster_name if cluster_name\n rescue\n return ''\n end\n return \"\"\n else\n return stdout.join().gsub(/.*= /,\"\").strip\n end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def add_node_attr(session, node, key, value)\n stdout, stderr, retval = run_cmd(\n session, PCS, \"property\", \"set\", \"--node\", node, key.to_s + '=' + value.to_s\n )\n return retval\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_wizard(params, request, session)\n if not allowed_for_local_cluster(session, Permissions::READ)\n return 403, 'Permission denied'\n end\n wizard = PCSDWizard.getWizard(params[\"wizard\"])\n if wizard != nil\n return erb wizard.collection_page\n else\n return \"Error finding Wizard - #{params[\"wizard\"]}\"\n end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def fence_device_form(params, request, session)\n if not allowed_for_local_cluster(session, Permissions::READ)\n return 403, 'Permission denied'\n end\n\n @cur_resource = get_resource_by_id(params[:resource], get_cib_dom(session))\n\n if @cur_resource.instance_of?(ClusterEntity::Primitive) and @cur_resource.stonith\n @resource_agents = getFenceAgents(session, @cur_resource.agentname)\n @existing_resource = true\n @fenceagent = @resource_agents[@cur_resource.type]\n erb :fenceagentform\n else\n \"Can't find fence device\"\n end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def resource_clone(params, request, session)\n if not allowed_for_local_cluster(session, Permissions::WRITE)\n return 403, 'Permission denied'\n end\n\n unless params[:resource_id]\n return [400, 'resource_id has to be specified.']\n end\n \n _, stderr, retval = run_cmd(\n session, PCS, 'resource', 'clone', params[:resource_id]\n )\n if retval != 0\n return [400, 'Unable to create clone resource from ' +\n \"'#{params[:resource_id]}': #{stderr.join('')}\"\n ]\n end\n return 200\nend", "label_name": "CWE-384", "label": 1}
{"code": "def remote_remove_nodes(params, request, session)\n if not allowed_for_local_cluster(session, Permissions::FULL)\n return 403, 'Permission denied'\n end\n count = 0\n out = \"\"\n node_list = []\n options = []\n while params[\"nodename-\" + count.to_s]\n node_list << params[\"nodename-\" + count.to_s]\n count = count + 1\n end\n options << \"--force\" if params[\"force\"]\n\n cur_node = get_current_node_name()\n if i = node_list.index(cur_node)\n node_list.push(node_list.delete_at(i))\n end\n\n # stop the nodes at once in order to:\n # - prevent resources from moving pointlessly\n # - get possible quorum loss warning\n stop_params = node_list + options\n stdout, stderr, retval = run_cmd(\n session, PCS, \"cluster\", \"stop\", *stop_params\n )\n if retval != 0\n return [400, stderr.join]\n end\n\n node_list.each {|node|\n retval, output = remove_node(session, node, true)\n out = out + output.join(\"\\n\")\n }\n config = PCSConfig.new(Cfgsync::PcsdSettings.from_file('{}').text())\n if config.get_nodes($cluster_name) == nil or config.get_nodes($cluster_name).length == 0\n return [200,\"No More Nodes\"]\n end\n return out\nend", "label_name": "CWE-384", "label": 1}
{"code": "def get_sw_versions(params, request, session)\n versions = {\n \"rhel\" => get_rhel_version(),\n \"pcs\" => get_pcsd_version(),\n \"pacemaker\" => get_pacemaker_version(),\n \"corosync\" => get_corosync_version(),\n \"cman\" => get_cman_version(),\n }\n return JSON.generate(versions)\nend", "label_name": "CWE-384", "label": 1}
{"code": "def set_node_utilization(params, reqest, session)\n unless allowed_for_local_cluster(session, Permissions::WRITE)\n return 403, 'Permission denied'\n end\n\n unless params[:node] and params[:name]\n return 400, 'node and name are required'\n end\n\n node = params[:node]\n name = params[:name]\n value = params[:value] || ''\n\n _, stderr, retval = run_cmd(\n session, PCS, 'node', 'utilization', node, \"#{name}=#{value}\"\n )\n\n if retval != 0\n return [400, \"Unable to set utilization '#{name}=#{value}' for node \" +\n \"'#{res_id}': #{stderr.join('')}\"\n ]\n end\n return 200\nend", "label_name": "CWE-384", "label": 1}
{"code": "def resource_start(params, request, session)\n if not allowed_for_local_cluster(session, Permissions::WRITE)\n return 403, 'Permission denied'\n end\n stdout, stderr, retval = run_cmd(\n session, PCS, \"resource\", \"enable\", params[:resource]\n )\n if retval == 0\n return JSON.generate({\"success\" => \"true\"})\n else\n return JSON.generate({\"error\" => \"true\", \"stdout\" => stdout, \"stderror\" => stderr})\n end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def cluster_destroy(params, request, session)\n if not allowed_for_local_cluster(session, Permissions::FULL)\n return 403, 'Permission denied'\n end\n out, errout, retval = run_cmd(session, PCS, \"cluster\", \"destroy\")\n if retval == 0\n return [200, \"Successfully destroyed cluster\"]\n else\n return [400, \"Error destroying cluster:\\n#{out}\\n#{errout}\\n#{retval}\\n\"]\n end\nend", "label_name": "CWE-384", "label": 1}
{"code": "def remote_pcsd_restart(params, request, session)\n pcsd_restart()\n return [200, 'success']\nend", "label_name": "CWE-384", "label": 1}
{"code": "export async function formParse(req: any): Promise<FormParseResult> {\n\t// It's not clear how to get mocked requests to be parsed successfully by\n\t// formidable so we use this small hack. If it's mocked, we are running test\n\t// units and the request body is already an object and can be returned.\n\tif (req.__isMocked) {\n\t\tconst output: any = {};\n\t\tif (req.files) output.files = req.files;\n\t\toutput.fields = req.body || {};\n\t\treturn output;\n\t}\n\n\t// Note that for Formidable to work, the content-type must be set in the\n\t// headers\n\treturn new Promise((resolve: Function, reject: Function) => {\n\t\tconst form = formidable({ multiples: true });\n\t\tform.parse(req, (error: any, fields: any, files: any) => {\n\t\t\tif (error) {\n\t\t\t\treject(error);\n\t\t\t\treturn;\n\t\t\t}\n\n\t\t\tresolve({ fields, files });\n\t\t});\n\t});\n}", "label_name": "CWE-352", "label": 0}