\\n\", self::$mysqli->error);\n }else{\n self::$last_id = self::$mysqli->insert_id;\n }\n \n } catch (exception $e) {\n echo $e->getMessage();\n }\n \n }\n \n return true;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public static function go($input, $path, $allowed='', $uniq=false, $size='', $width = '', $height = ''){\n $filename = Typo::cleanX($_FILES[$input]['name']);\n $filename = str_replace(' ', '_', $filename);\n if(isset($_FILES[$input]) && $_FILES[$input]['error'] == 0){\n if($uniq == true){\n $uniqfile = sha1(microtime().$filename);\n }else{\n $uniqfile = '';\n }\n\n $extension = pathinfo($_FILES[$input]['name'], PATHINFO_EXTENSION);\n $filetmp = $_FILES[$input]['tmp_name'];\n $filepath = GX_PATH.$path.$uniqfile.$filename;\n\n if(!in_array(strtolower($extension), $allowed)){\n $result['error'] = 'File not allowed';\n }else{\n if(move_uploaded_file(\n $filetmp, \n $filepath)\n ){\n $result['filesize'] = filesize($filepath);\n $result['filename'] = $uniqfile.$filename;\n $result['path'] = $path.$uniqfile.$filename;\n $result['filepath'] = $filepath;\n $result['fileurl'] = Options::get('siteurl').$path.$uniqfile.$filename;\n\n }else{\n $result['error'] = 'Cannot upload to directory, please check \n if directory is exist or You had permission to write it.';\n }\n }\n\n \n }else{\n //$result['error'] = $_FILES[$input]['error'];\n $result['error'] = '';\n }\n\n return $result;\n\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function store(CurrencyFormRequest $request)\n {\n /** @var User $user */\n $user = auth()->user();\n $data = $request->getCurrencyData();\n if (!$this->userRepository->hasRole($user, 'owner')) {\n\n Log::error('User ' . auth()->user()->id . ' is not admin, but tried to store a currency.');\n Log::channel('audit')->info('Tried to create (POST) currency without admin rights.', $data);\n\n return redirect($this->getPreviousUri('currencies.create.uri'));\n\n }\n\n $data['enabled'] = true;\n try {\n $currency = $this->repository->store($data);\n } catch (FireflyException $e) {\n Log::error($e->getMessage());\n Log::channel('audit')->info('Could not store (POST) currency without admin rights.', $data);\n $request->session()->flash('error', (string) trans('firefly.could_not_store_currency'));\n $currency = null;\n }\n $redirect = redirect($this->getPreviousUri('currencies.create.uri'));\n\n if (null !== $currency) {\n $request->session()->flash('success', (string) trans('firefly.created_currency', ['name' => $currency->name]));\n Log::channel('audit')->info('Created (POST) currency.', $data);\n if (1 === (int) $request->get('create_another')) {\n\n $request->session()->put('currencies.create.fromStore', true);\n\n $redirect = redirect(route('currencies.create'))->withInput();\n\n }\n }\n\n return $redirect;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function enableCurrency(TransactionCurrency $currency)\n {\n app('preferences')->mark();\n\n $this->repository->enable($currency);\n session()->flash('success', (string) trans('firefly.currency_is_now_enabled', ['name' => $currency->name]));\n Log::channel('audit')->info(sprintf('Enabled currency %s.', $currency->code));\n\n return redirect(route('currencies.index'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public static function rss() {\n switch (SMART_URL) {\n case true:\n # code...\n $url = Options::get('siteurl').\"/rss\".GX_URL_PREFIX;\n break;\n \n default:\n # code...\n $url = Options::get('siteurl').\"/index.php?rss\";\n break;\n\n }\n\n return $url;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function pinCommentAction(ProjectComment $comment)\n {\n $comment->setPinned(!$comment->isPinned());\n try {\n $this->repository->saveComment($comment);\n } catch (\\Exception $ex) {\n $this->flashUpdateException($ex);\n }\n\n return $this->redirectToRoute('project_details', ['id' => $comment->getProject()->getId()]);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public static function page($vars) {\n switch (SMART_URL) {\n case true:\n # code...\n $url = Options::get('siteurl').\"/\".self::slug($vars).GX_URL_PREFIX;\n break;\n \n default:\n # code...\n $url = Options::get('siteurl').\"/index.php?page={$vars}\";\n break;\n\n }\n\n return $url;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function submit(Request $request)\n {\n return logout();\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function write($template = '')\n {\n if (!empty($this->script_files)) {\n $this->set_env('request_token', $this->app->get_request_token());\n }\n\n $commands = $this->get_js_commands($framed);\n\n // if all js commands go to parent window we can ignore all\n // script files and skip rcube_webmail initialization (#1489792)\n if ($framed) {\n $this->scripts = array();\n $this->script_files = array();\n $this->header = '';\n $this->footer = '';\n }\n\n // write all javascript commands\n $this->add_script($commands, 'head_top');\n\n // send clickjacking protection headers\n $iframe = $this->framed || $this->env['framed'];\n if (!headers_sent() && ($xframe = $this->app->config->get('x_frame_options', 'sameorigin'))) {\n header('X-Frame-Options: ' . ($iframe && $xframe == 'deny' ? 'sameorigin' : $xframe));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " protected static function __Load($path) {\n include_once($path);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function testDeleteTemplateAction()\n {\n $client = $this->getClientForAuthenticatedUser(User::ROLE_ADMIN);\n\n $fixture = new InvoiceTemplateFixtures();\n $template = $this->importFixture($fixture);\n $id = $template[0]->getId();\n\n $this->request($client, '/invoice/template/' . $id . '/delete');\n $this->assertIsRedirect($client, '/invoice/template');\n $client->followRedirect();\n\n $this->assertTrue($client->getResponse()->isSuccessful());\n $this->assertHasFlashSuccess($client);\n\n $this->assertEquals(0, $this->getEntityManager()->getRepository(InvoiceTemplate::class)->count([]));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " function update_license_status() {\n $status = '';\n $license_key = $this->get_license_key();\n\n if (!empty($license_key) || defined('W3TC_LICENSE_CHECK')) {\n $license = edd_w3edge_w3tc_check_license($license_key, W3TC_VERSION);\n $version = '';\n\n if ($license) {\n $status = $license->license;\n if ('host_valid' == $status) {\n $version = 'pro';\n } elseif (in_array($status, array('site_inactive','valid')) && w3tc_is_pro_dev_mode()) {\n $status = 'valid';\n $version = 'pro_dev';\n }\n }\n\n $this->_config->set('plugin.type', $version);\n } else {\n $status = 'no_key';\n $this->_config->set('plugin.type', '');\n }\n try {\n $this->_config->save();\n } catch(Exception $ex) {}\n return $status;\n }", "label_name": "CWE-352", "label": 0}
+{"code": "\tpublic static function startup()\n\t{\n\t\t//Override the default expire time of token\n\t\t\\CsrfMagic\\Csrf::$expires = 259200;\n\t\t\\CsrfMagic\\Csrf::$callback = function ($tokens) {\n\t\t\tthrow new \\App\\Exceptions\\AppException('Invalid request - Response For Illegal Access', 403);\n\t\t};\n\t\t$js = 'vendor/yetiforce/csrf-magic/src/Csrf.min.js';\n\t\tif (!IS_PUBLIC_DIR) {\n\t\t\t$js = 'public_html/' . $js;\n\t\t}\n\t\t\\CsrfMagic\\Csrf::$dirSecret = __DIR__;\n\t\t\\CsrfMagic\\Csrf::$rewriteJs = $js;\n\t\t\\CsrfMagic\\Csrf::$cspToken = \\App\\Session::get('CSP_TOKEN');\n\t\t\\CsrfMagic\\Csrf::$frameBreaker = \\Config\\Security::$csrfFrameBreaker;\n\t\t\\CsrfMagic\\Csrf::$windowVerification = \\Config\\Security::$csrfFrameBreakerWindow;\n\n\t\t/*\n\t\t * if an ajax request initiated, then if php serves content with tags\n\t\t * as a response, then unnecessarily we are injecting csrf magic javascipt\n\t\t * in the response html at and using csrf_ob_handler().\n\t\t * So, to overwride above rewriting we need following config.\n\t\t */\n\t\tif (static::isAjax()) {\n\t\t\t\\CsrfMagic\\Csrf::$frameBreaker = false;\n\t\t\t\\CsrfMagic\\Csrf::$rewriteJs = null;\n\t\t}\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function testConfigurationCookieCreate()\n {\n $_SERVER['REQUEST_METHOD'] = 'GET';\n\n $controller = $this->getMock('Cake\\Controller\\Controller', ['redirect']);\n $controller->request = new Request(['webroot' => '/dir/']);\n $controller->response = new Response();\n\n $component = new CsrfComponent($this->registry, [\n 'cookieName' => 'token',\n 'expiry' => '+1 hour',\n 'secure' => true,\n 'httpOnly' => true\n ]);\n\n $event = new Event('Controller.startup', $controller);\n $component->startup($event);\n\n $this->assertEmpty($controller->response->cookie('csrfToken'));\n $cookie = $controller->response->cookie('token');\n $this->assertNotEmpty($cookie, 'Should set a token.');\n $this->assertRegExp('/^[a-f0-9]+$/', $cookie['value'], 'Should look like a hash.');\n $this->assertWithinRange((new Time('+1 hour'))->format('U'), $cookie['expire'], 1, 'session duration.');\n $this->assertEquals('/dir/', $cookie['path'], 'session path.');\n $this->assertTrue($cookie['secure'], 'cookie security flag missing');\n $this->assertTrue($cookie['httpOnly'], 'cookie httpOnly flag missing');\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public static function meta($cont_title='', $cont_desc='', $pre =''){\n global $data;\n //print_r($data);\n //if(empty($data['posts'][0]->title)){ \n\n if(is_array($data) && isset($data['posts'][0]->title)){\n \n $sitenamelength = strlen(Options::get('sitename'));\n $limit = 70-$sitenamelength-6;\n $cont_title = substr(Typo::Xclean(Typo::strip($data['posts'][0]->title)),0,$limit);\n $titlelength = strlen($data['posts'][0]->title);\n if($titlelength > $limit+3) { $dotted = \"...\";} else {$dotted = \"\";}\n $cont_title = \"{$pre} {$cont_title}{$dotted} - \";\n }else{\n $cont_title = \"\";\n }\n if(is_array($data) && isset($data['posts'][0]->content)){\n $desc = Typo::strip($data['posts'][0]->content);\n }else{\n $desc = \"\";\n }\n\n $meta = \"\n \n \n {$cont_title}\".Options::get('sitename').\"\n \n \n \n \n \n \n \n \n \";\n \n $meta .= \"\n \";\n echo $meta;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function create(Request $request)\n {\n /** @var User $user */\n $user = auth()->user();\n if (!$this->userRepository->hasRole($user, 'owner')) {\n $request->session()->flash('error', (string) trans('firefly.ask_site_owner', ['owner' => e(config('firefly.site_owner'))]));\n\n return redirect(route('currencies.index'));\n }\n\n $subTitleIcon = 'fa-plus';\n $subTitle = (string) trans('firefly.create_currency');\n\n // put previous url in session if not redirect from store (not \"create another\").\n if (true !== session('currencies.create.fromStore')) {\n $this->rememberPreviousUri('currencies.create.uri');\n }\n $request->session()->forget('currencies.create.fromStore');\n\n Log::channel('audit')->info('Create new currency.');\n\n return prefixView('currencies.create', compact('subTitleIcon', 'subTitle'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": "function phpAds_SessionStart()\n{\n\tglobal $session;\n\tif (empty($_COOKIE['sessionID'])) {\n\t\t$session = array();\n\t\t$_COOKIE['sessionID'] = md5(uniqid('phpads', 1));\n\n phpAds_SessionSetAdminCookie('sessionID', $_COOKIE['sessionID']);\n\t}\n\treturn $_COOKIE['sessionID'];\n}", "label_name": "CWE-384", "label": 1}
+{"code": "\tfunction handleFormSubmission(&$request, &$output, &$session) {\n\t\tif ($request->getText('action')) {\n\t\t\thandleRequestActionSubmission('admin', $this, $session);\n\t\t} else if ($request->getText('blockSubmit')) {\n\t\t\t$this->handleBlockFormSubmission($request, $output, $session);\n\t\t} else if ($request->getText('unblockSubmit')) {\n\t\t\t$this->handleUnblockFormSubmission($request, $output, $session);\n\t\t} else if ($request->getText('bypassAddUsername') || $request->getText('bypassRemoveUsername')) { //TODO: refactor to move all the subpages into their own files\n\t\t\t$bypassPage = new RequirementsBypassPage($this);\n\t\t\t$bypassPage->handleFormSubmission();\n\t\t}\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": "\tprivate function _handleCallback(){\n\t\ttry {\n\n\t\t\t// Try to get an access token using the authorization code grant.\n\t\t\t$accessToken = $this->_provider->getAccessToken('authorization_code', [\n\t\t\t\t'code' => $_GET['code']\n\t\t\t]);\n\t\t} catch (\\League\\OAuth2\\Client\\Provider\\Exception\\IdentityProviderException $e) {\n\n\t\t\t// Failed to get the access token or user details.\n\t\t\texit($e->getMessage());\n\n\t\t}\n\n\t\t$resourceOwner = $this->_provider->getResourceOwner($accessToken);\n\t\t$user = $this->_userHandling( $resourceOwner->toArray() );\n\t\t$user->setCookies();\n\n\t\tglobal $wgOut, $wgRequest;\n\t\t$title = null;\n\t\t$wgRequest->getSession()->persist();\n\t\tif( $wgRequest->getSession()->exists('returnto') ) {\n\t\t\t$title = Title::newFromText( $wgRequest->getSession()->get('returnto') );\n\t\t\t$wgRequest->getSession()->remove('returnto');\n\t\t\t$wgRequest->getSession()->save();\n\t\t}\n\n\t\tif( !$title instanceof Title || 0 > $title->mArticleID ) {\n\t\t\t$title = Title::newMainPage();\n\t\t}\n\t\t$wgOut->redirect( $title->getFullURL() );\n\t\treturn true;\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function setFrom($address, $name = '', $auto = true)\n {\n $address = trim($address);\n $name = trim(preg_replace('/[\\r\\n]+/', '', $name)); //Strip breaks and trim\n if (!$this->validateAddress($address)) {\n $this->setError($this->lang('invalid_address') . ': ' . $address);\n $this->edebug($this->lang('invalid_address') . ': ' . $address);\n if ($this->exceptions) {\n throw new phpmailerException($this->lang('invalid_address') . ': ' . $address);\n }\n return false;\n }\n $this->From = $address;\n $this->FromName = $name;\n if ($auto) {\n if (empty($this->Sender)) {\n $this->Sender = $address;\n }\n }\n return true;\n }", "label_name": "CWE-352", "label": 0}
+{"code": "function addChannelPageTools($agencyid, $websiteId, $channelid, $channelType)\n{\n if ($channelType == 'publisher') {\n $deleteReturlUrl = MAX::constructUrl(MAX_URL_ADMIN, 'affiliate-channels.php');\n }\n else {\n $deleteReturlUrl = MAX::constructUrl(MAX_URL_ADMIN, 'channel-index.php');\n }\n\n //duplicate\n addPageLinkTool($GLOBALS[\"strDuplicate\"], MAX::constructUrl(MAX_URL_ADMIN, \"channel-modify.php?duplicate=true&agencyid=$agencyid&affiliateid=$websiteId&channelid=$channelid&returnurl=\".urlencode(basename($_SERVER['SCRIPT_NAME']))), \"iconTargetingChannelDuplicate\");\n\n //delete\n $deleteConfirm = phpAds_DelConfirm($GLOBALS['strConfirmDeleteChannel']);\n addPageLinkTool($GLOBALS[\"strDelete\"], MAX::constructUrl(MAX_URL_ADMIN, \"channel-delete.php?token=\" . urlencode(phpAds_SessionGetToken()) . \"&agencyid=$agencyid&affiliateid=$websiteId&channelid=$channelid&returnurl=$deleteReturlUrl\"), \"iconDelete\", null, $deleteConfirm);\n}", "label_name": "CWE-352", "label": 0}
+{"code": " function storeSerializedSession($serialized_session_data, $session_id)\n {\n $doSession = OA_Dal::staticGetDO('session', $session_id);\n if ($doSession) {\n $doSession->sessiondata = $serialized_session_data;\n $doSession->update();\n }\n else {\n $doSession = OA_Dal::factoryDO('session');\n $doSession->sessionid = $session_id;\n $doSession->sessiondata = $serialized_session_data;\n $doSession->insert();\n }\n }", "label_name": "CWE-384", "label": 1}
+{"code": " public function __destruct()\n {\n if ($this->Mailer == 'smtp') { //close any open SMTP connection nicely\n $this->smtpClose();\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": " $otherPublisherName = MAX_buildName($aOtherPublisher['publisher_id'], $aOtherPublisher['name']);\n if ($aOtherPublisher['publisher_id'] != $affiliateid) {\n $form .= \"\";\n }\n }\n $form .= \"\";\n\n addPageFormTool($GLOBALS['strMoveTo'], 'iconZoneMove', $form);\n }\n\n //delete\n if (OA_Permission::isAccount(OA_ACCOUNT_ADMIN)\n || OA_Permission::isAccount(OA_ACCOUNT_MANAGER)\n || OA_Permission::hasPermission(OA_PERM_ZONE_DELETE)) {\n $deleteConfirm = phpAds_DelConfirm($GLOBALS['strConfirmDeleteZone']);\n addPageLinkTool($GLOBALS[\"strDelete\"], MAX::constructUrl(MAX_URL_ADMIN, \"zone-delete.php?token=\" . urlencode(phpAds_SessionGetToken()) . \"&affiliateid=$affiliateid&zoneid=$zoneid&returnurl=affiliate-zones.php\"), \"iconDelete\", null, $deleteConfirm);\n }\n\n //shortcut\n addPageShortcut($GLOBALS['strBackToZones'], MAX::constructUrl(MAX_URL_ADMIN, \"affiliate-zones.php?affiliateid=$affiliateid\"), \"iconBack\");\n $entityString = _getEntityString($aEntities);\n addPageShortcut($GLOBALS['strZoneHistory'], MAX::constructUrl(MAX_URL_ADMIN, \"stats.php?entity=zone&breakdown=history&$entityString\"), 'iconStatistics');\n}", "label_name": "CWE-352", "label": 0}
+{"code": " public static function httpMethodProvider()\n {\n return [\n ['PATCH'], ['PUT'], ['POST'], ['DELETE']\n ];\n }", "label_name": "CWE-352", "label": 0}
+{"code": " foreach ($all_users as &$u) {\n if ($u['username'] == $username && $this->verifyPassword($password, $u['password'])) {\n $user = $this->mapToUserObject($u);\n $this->store($user);\n $this->session->set(self::SESSION_HASH, $u['password']);\n\n return true;\n }\n }", "label_name": "CWE-384", "label": 1}
+{"code": " function getRights($interface = 'central') {\n\n $values = [READ => __('Read'),\n CREATE => __('Create'),\n PURGE => _x('button', 'Delete permanently'),\n self::CHECKUPDATE => __('Check for upgrade')];\n return $values;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function logout(){\n $login_user = $this->checkLogin();\n D(\"UserToken\")->where(\" uid = '$login_user[uid]' \")->save(array(\"token_expire\"=>0));\n session(\"login_user\" , NULL);\n cookie('cookie_token',NULL);\n session(null);\n $this->sendResult(array());\n }", "label_name": "CWE-352", "label": 0}
+{"code": "function yourls_verify_nonce( $action, $nonce = false, $user = false, $return = '' ) {\n\t// get user\n\tif( false == $user )\n\t\t$user = defined( 'YOURLS_USER' ) ? YOURLS_USER : '-1';\n\n\t// get current nonce value\n\tif( false == $nonce && isset( $_REQUEST['nonce'] ) )\n\t\t$nonce = $_REQUEST['nonce'];\n\n\t// Allow plugins to short-circuit the rest of the function\n\t$valid = yourls_apply_filter( 'verify_nonce', false, $action, $nonce, $user, $return );\n\tif ($valid) {\n\t\treturn true;\n\t}\n\n\t// what nonce should be\n\t$valid = yourls_create_nonce( $action, $user );\n\n\tif( $nonce == $valid ) {\n\t\treturn true;\n\t} else {\n\t\tif( $return )\n\t\t\tdie( $return );\n\t\tyourls_die( yourls__( 'Unauthorized action or expired link' ), yourls__( 'Error' ), 403 );\n\t}\n}", "label_name": "CWE-352", "label": 0}
+{"code": " public static function sitemap() {\n switch (SMART_URL) {\n case true:\n # code...\n $url = Options::get('siteurl').\"/sitemap\".GX_URL_PREFIX;\n break;\n \n default:\n # code...\n $url = Options::get('siteurl').\"/index.php?page=sitemap\";\n break;\n\n }\n\n return $url;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function delete(Request $request, TransactionCurrency $currency)\n {\n /** @var User $user */\n $user = auth()->user();\n if (!$this->userRepository->hasRole($user, 'owner')) {\n\n $request->session()->flash('error', (string) trans('firefly.ask_site_owner', ['owner' => e(config('firefly.site_owner'))]));\n Log::channel('audit')->info(sprintf('Tried to visit page to delete currency %s but is not site owner.', $currency->code));\n\n return redirect(route('currencies.index'));\n\n }\n\n if ($this->repository->currencyInUse($currency)) {\n $location = $this->repository->currencyInUseAt($currency);\n $message = (string) trans(sprintf('firefly.cannot_disable_currency_%s', $location), ['name' => e($currency->name)]);\n $request->session()->flash('error', $message);\n Log::channel('audit')->info(sprintf('Tried to visit page to delete currency %s but currency is in use.', $currency->code));\n\n return redirect(route('currencies.index'));\n }\n\n // put previous url in session\n $this->rememberPreviousUri('currencies.delete.uri');\n $subTitle = (string) trans('form.delete_currency', ['name' => $currency->name]);\n Log::channel('audit')->info(sprintf('Visit page to delete currency %s.', $currency->code));\n\n return prefixView('currencies.delete', compact('currency', 'subTitle'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function testDuplicateAction()\n {\n $client = $this->getClientForAuthenticatedUser(User::ROLE_ADMIN);\n /** @var EntityManager $em */\n $em = $this->getEntityManager();\n $project = $em->find(Project::class, 1);\n $project->setMetaField((new ProjectMeta())->setName('foo')->setValue('bar'));\n $project->setEnd(new \\DateTime());\n $em->persist($project);\n $team = new Team();\n $team->addTeamlead($this->getUserByRole(User::ROLE_ADMIN));\n $team->addProject($project);\n $team->setName('project 1');\n $em->persist($team);\n $rate = new ProjectRate();\n $rate->setProject($project);\n $rate->setRate(123.45);\n $em->persist($rate);\n $activity = new Activity();\n $activity->setName('blub');\n $activity->setProject($project);\n $activity->setMetaField((new ActivityMeta())->setName('blub')->setValue('blab'));\n $em->persist($activity);\n $rate = new ActivityRate();\n $rate->setActivity($activity);\n $rate->setRate(123.45);\n $em->persist($rate);\n $em->flush();\n\n $this->request($client, '/admin/project/1/duplicate');\n $this->assertIsRedirect($client, '/details');\n $client->followRedirect();\n $node = $client->getCrawler()->filter('div.box#project_rates_box');\n self::assertEquals(1, $node->count());\n $node = $client->getCrawler()->filter('div.box#project_rates_box table.dataTable tbody tr:not(.summary)');\n self::assertEquals(1, $node->count());\n self::assertStringContainsString('123.45', $node->text(null, true));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " foreach ($indexToDelete as $indexName) {\n $this->addSql('DROP INDEX ' . $indexName . ' ON ' . $users);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function __construct(){\n\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function save(){\n $login_user = $this->checkLogin();\n $uid = $login_user['uid'] ;\n\n $id = I(\"id/d\");\n $member_group_id = I(\"member_group_id/d\");\n $cat_id = I(\"cat_id/d\");\n\n $teamItemMemberInfo = D(\"TeamItemMember\")->where(\" id = '$id' \")->find();\n $item_id = $teamItemMemberInfo['item_id'] ;\n $team_id = $teamItemMemberInfo['team_id'] ;\n\n\n if(!$this->checkItemManage($uid , $item_id)){\n $this->sendError(10303);\n return ;\n }\n\n $teamInfo = D(\"Team\")->where(\" id = '$team_id' and uid = '$login_user[uid]' \")->find();\n if (!$teamInfo) {\n $this->sendError(10209,\"\u65e0\u6b64\u56e2\u961f\u6216\u8005\u4f60\u65e0\u7ba1\u7406\u6b64\u56e2\u961f\u7684\u6743\u9650\");\n return ;\n } \n\n if(isset($_POST['member_group_id'])){\n $return = D(\"TeamItemMember\")->where(\" id = '$id' \")->save(array(\"member_group_id\"=>$member_group_id));\n }\n if(isset($_POST['cat_id'])){\n $return = D(\"TeamItemMember\")->where(\" id = '$id' \")->save(array(\"cat_id\"=>$cat_id));\n }\n $this->sendResult($return);\n \n }", "label_name": "CWE-352", "label": 0}
+{"code": "\tstatic public function onPost( $par, $out, $request ) {\n\t\tglobal $wgUser;\n\t\tif (!$request->getText('reason')) {\n\t\t\t$out->addHTML(Html::rawElement(\n\t\t\t\t'p',\n\t\t\t\t[ 'class' => 'error '],\n\t\t\t\twfMessage( 'report-error-missing-reason' )->escaped()\n\t\t\t));\n\t\t} else {\n\t\t\t$dbw = wfGetDB( DB_MASTER );\n\t\t\t$dbw->startAtomic(__METHOD__);\n\t\t\t$dbw->insert( 'report_reports', [\n\t\t\t\t'report_revid' => (int)$par,\n\t\t\t\t'report_reason' => $request->getText('reason'),\n\t\t\t\t'report_user' => $wgUser->getId(),\n\t\t\t\t'report_user_text' => $wgUser->getName(),\n\t\t\t\t'report_timestamp' => wfTimestampNow()\n\t\t\t], __METHOD__ );\n\t\t\t$dbw->endAtomic(__METHOD__);\n\t\t\t$out->addWikiMsg( 'report-success' );\n\t\t\t$out->addWikiMsg( 'returnto', '[[' . SpecialPage::getTitleFor('Diff', $par)->getPrefixedText() . ']]' );\n\t\t\treturn;\n\t\t}\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function defaultCurrency(Request $request, TransactionCurrency $currency)\n {\n app('preferences')->set('currencyPreference', $currency->code);\n app('preferences')->mark();\n\n Log::channel('audit')->info(sprintf('Make %s the default currency.', $currency->code));\n\n $this->repository->enable($currency);\n $request->session()->flash('success', (string) trans('firefly.new_default_currency', ['name' => $currency->name]));\n\n return redirect(route('currencies.index'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " function render() {\r\n $output = $this->pageContext->getOutput();\r\n\r\n $output->enableOOUI();\r\n\r\n $this->showAddBypassForm();\r\n $this->showBypassesList();\r\n }\r", "label_name": "CWE-352", "label": 0}
+{"code": "function phpAds_SessionDataFetch()\n{\n global $session;\n $dal = new MAX_Dal_Admin_Session();\n\n // Guard clause: Can't fetch a session without an ID\n\tif (empty($_COOKIE['sessionID'])) {\n return;\n }\n\n $serialized_session = $dal->getSerializedSession($_COOKIE['sessionID']);\n\n // This is required because 'sessionID' cookie is set to new during logout.\n // According to comments in the file it is because some servers do not\n // support setting cookies during redirect.\n if (empty($serialized_session)) {\n return;\n }\n\n $loaded_session = unserialize($serialized_session);\n\tif (!$loaded_session) {\n // XXX: Consider raising an error\n return;\n }\n\t$session = $loaded_session;\n $dal->refreshSession($_COOKIE['sessionID']);\n}", "label_name": "CWE-384", "label": 1}
+{"code": " public function pwd(){\n $item_id = I(\"item_id/d\");\n $password = I(\"password\");\n $v_code = I(\"v_code\");\n $refer_url = I('refer_url');\n\n //\u68c0\u67e5\u7528\u6237\u8f93\u9519\u5bc6\u7801\u7684\u6b21\u6570\u3002\u5982\u679c\u8d85\u8fc7\u4e00\u5b9a\u6b21\u6570\uff0c\u5219\u9700\u8981\u9a8c\u8bc1 \u9a8c\u8bc1\u7801\n $key= 'item_pwd_fail_times_'.$item_id;\n if(!D(\"VerifyCode\")->_check_times($key,10)){\n if (!$v_code || $v_code != session('v_code')) {\n $this->sendError(10206,L('verification_code_are_incorrect'));\n return;\n }\n }\n session('v_code',null) ;\n $item = D(\"Item\")->where(\"item_id = '$item_id' \")->find();\n if ($item['password'] == $password) {\n session(\"visit_item_\".$item_id , 1 );\n $this->sendResult(array(\"refer_url\"=>base64_decode($refer_url))); \n }else{\n D(\"VerifyCode\")->_ins_times($key);//\u8f93\u9519\u5bc6\u7801\u5219\u8bbe\u7f6e\u8f93\u9519\u6b21\u6570\n \n if(D(\"VerifyCode\")->_check_times($key,10)){\n $error_code = 10307 ;\n }else{\n $error_code = 10308 ;\n }\n $this->sendError($error_code,L('access_password_are_incorrect'));\n }\n\n }", "label_name": "CWE-352", "label": 0}
+{"code": "\t\t\t\t\t$formatted = wfMessage( 'datadump-table-column-failed' )->text();\n\t\t\t\t} else {\n\t\t\t\t\t$formatted = wfMessage( 'datadump-table-column-queued' )->text();\n\t\t\t\t}\n\t\t\t\tbreak;\n\t\t\tcase 'dumps_size':\n\t\t\t\t$formatted = htmlspecialchars(\n\t\t\t\t\t$this->getLanguage()->formatSize( isset( $row->dumps_size ) ? $row->dumps_size : 0 ) );\n\t\t\t\tbreak;\n\t\t\tcase 'dumps_delete':\n\t\t\t\t$linkRenderer = MediaWikiServices::getInstance()->getLinkRenderer();\n\n\t\t\t\t$query = [\n\t\t\t\t\t'action' => 'delete',\n\t\t\t\t\t'type' => $row->dumps_type,\n\t\t\t\t\t'dump' => $row->dumps_filename\n\t\t\t\t];\n\n\t\t\t\t$formatted = $linkRenderer->makeLink( $this->pageTitle, wfMessage( 'datadump-delete-button' )->text(), [], $query );\n\t\t\t\tbreak;\n\t\t\tdefault:\n\t\t\t\t$formatted = \"Unable to format $name\";\n\t\t\t\tbreak;\n\t\t}\n\n\t\treturn $formatted;\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function addReplyTo($address, $name = '')\n {\n return $this->addAnAddress('Reply-To', $address, $name);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function addUser(){\n $login_user = $this->checkLogin();\n $this->checkAdmin();\n $username = I(\"username\");\n $password = I(\"password\");\n $uid = I(\"uid\");\n $name = I(\"name\");\n if(!$username){\n $this->sendError(10101,'\u7528\u6237\u540d\u4e0d\u5141\u8bb8\u4e3a\u7a7a');\n return ;\n }\n if($uid){\n if($password){\n D(\"User\")->updatePwd($uid, $password);\n }\n if($name){\n D(\"User\")->where(\" uid = '$uid' \")->save(array(\"name\"=>$name));\n }\n $this->sendResult(array());\n }else{\n if (D(\"User\")->isExist($username)) {\n $this->sendError(10101,L('username_exists'));\n return ;\n }\n $new_uid = D(\"User\")->register($username,$password);\n if (!$new_uid) {\n $this->sendError(10101);\n }else{\n if($name){\n D(\"User\")->where(\" uid = '$new_uid' \")->save(array(\"name\"=>$name));\n }\n $this->sendResult($return);\n }\n }\n\n }", "label_name": "CWE-352", "label": 0}
+{"code": "function csrf_get_tokens()\n{\n $has_cookies = !empty($_COOKIE);\n\n // $ip implements a composite key, which is sent if the user hasn't sent\n // any cookies. It may or may not be used, depending on whether or not\n // the cookies \"stick\"\n $secret = csrf_get_secret();\n if (!$has_cookies && $secret) {\n // :TODO: Harden this against proxy-spoofing attacks\n $ip = ';ip:' . csrf_hash($_SERVER['IP_ADDRESS']);\n } else {\n $ip = '';\n }\n csrf_start();\n\n // These are \"strong\" algorithms that don't require per se a secret\n if (session_id()) {\n return 'sid:' . csrf_hash(session_id()) . $ip;\n }\n if ($GLOBALS['csrf']['cookie']) {\n $val = csrf_generate_secret();\n setcookie($GLOBALS['csrf']['cookie'], $val);\n return 'cookie:' . csrf_hash($val) . $ip;\n }\n if ($GLOBALS['csrf']['key']) {\n return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip;\n }\n // These further algorithms require a server-side secret\n if (!$secret) {\n return 'invalid';\n }\n if ($GLOBALS['csrf']['user'] !== false) {\n return 'user:' . csrf_hash($GLOBALS['csrf']['user']);\n }\n if ($GLOBALS['csrf']['allow-ip']) {\n return ltrim($ip, ';');\n }\n return 'invalid';\n}", "label_name": "CWE-352", "label": 0}
+{"code": " public function attorn(){\n $login_user = $this->checkLogin();\n\n $username = I(\"username\");\n $item_id = I(\"item_id/d\");\n $password = I(\"password\");\n\n $item = D(\"Item\")->where(\"item_id = '$item_id' \")->find();\n\n if(!$this->checkItemManage($login_user['uid'] , $item['item_id'])){\n $this->sendError(10303);\n return ;\n }\n\n if(! D(\"User\")-> checkLogin($item['username'],$password)){\n $this->sendError(10208);\n return ;\n }\n\n $member = D(\"User\")->where(\" username = '%s' \",array($username))->find();\n\n if (!$member) {\n $this->sendError(10209);\n return ;\n }\n\n $data['username'] = $member['username'] ;\n $data['uid'] = $member['uid'] ;\n \n\n $id = D(\"Item\")->where(\" item_id = '$item_id' \")->save($data);\n\n $return = D(\"Item\")->where(\"item_id = '$item_id' \")->find();\n\n if (!$return) {\n $this->sendError(10101);\n }\n\n $this->sendResult($return);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public static function error ($vars=\"\") {\n if( isset($vars) && $vars != \"\" ) {\n include(GX_PATH.'/inc/lib/Control/Error/'.$vars.'.control.php');\n }else{\n include(GX_PATH.'/inc/lib/Control/Error/404.control.php');\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": " function handleFormSubmission() {\r\n $request = $request = $this->pageContext->getRequest();\r\n\r\n $dbw = getTransactableDatabase('scratch-confirmaccount-bypasses');\r\n\r\n foreach (self::requestVariableActionMapping as $fieldKey => $action) {\r\n if ($request->getText($fieldKey)) {\r\n $action($request->getText($fieldKey), $dbw);\r\n }\r\n }\r\n\r\n commitTransaction($dbw, 'scratch-confirmaccount-bypasses');\r\n\r\n $this->render();\r\n }\r", "label_name": "CWE-352", "label": 0}
+{"code": " public function password()\n {\n $user = Auth::user();\n\n return view('account/change-password', compact('user'));\n }", "label_name": "CWE-384", "label": 1}
+{"code": " public static function get_param($key = NULL) {\n $info = [\n 'stype' => htmlentities(self::$search_type),\n 'stext' => htmlentities(self::$search_text),\n 'method' => htmlentities(self::$search_method),\n 'datelimit' => self::$search_date_limit,\n 'fields' => self::$search_fields,\n 'sort' => self::$search_sort,\n 'chars' => htmlentities(self::$search_chars),\n 'order' => self::$search_order,\n 'forum_id' => self::$forum_id,\n 'memory_limit' => self::$memory_limit,\n 'composevars' => self::$composevars,\n 'rowstart' => self::$rowstart,\n 'search_param' => htmlentities(self::$search_param),\n ];\n\n return $key === NULL ? $info : (isset($info[$key]) ? $info[$key] : NULL);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function enable($id) {\n $this->active($id, TRUE);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function deleteCommentAction(ProjectComment $comment)\n {\n $projectId = $comment->getProject()->getId();\n\n try {\n $this->repository->deleteComment($comment);\n } catch (\\Exception $ex) {\n $this->flashDeleteException($ex);\n }\n\n return $this->redirectToRoute('project_details', ['id' => $projectId]);\n }", "label_name": "CWE-352", "label": 0}
+{"code": "\tpublic static function simple($input)\n\t{\n\t\treturn empty($str) ? '' : pts_strings::keep_in_string($input, pts_strings::CHAR_LETTER | pts_strings::CHAR_NUMERIC | pts_strings::CHAR_DASH | pts_strings::CHAR_DECIMAL | pts_strings::CHAR_SPACE | pts_strings::CHAR_UNDERSCORE | pts_strings::CHAR_COMMA | pts_strings::CHAR_AT | pts_strings::CHAR_COLON);\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function testSettingCookie()\n {\n $_SERVER['REQUEST_METHOD'] = 'GET';\n\n $controller = $this->getMock('Cake\\Controller\\Controller', ['redirect']);\n $controller->request = new Request(['webroot' => '/dir/']);\n $controller->response = new Response();\n\n $event = new Event('Controller.startup', $controller);\n $this->component->startup($event);\n\n $cookie = $controller->response->cookie('csrfToken');\n $this->assertNotEmpty($cookie, 'Should set a token.');\n $this->assertRegExp('/^[a-f0-9]+$/', $cookie['value'], 'Should look like a hash.');\n $this->assertEquals(0, $cookie['expire'], 'session duration.');\n $this->assertEquals('/dir/', $cookie['path'], 'session path.');\n\n $this->assertEquals($cookie['value'], $controller->request->params['_csrfToken']);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " protected function edebug($str)\n {\n if (!$this->SMTPDebug) {\n return;\n }\n switch ($this->Debugoutput) {\n case 'error_log':\n error_log($str);\n break;\n case 'html':\n //Cleans up output a bit for a better looking display that's HTML-safe\n echo htmlentities(preg_replace('/[\\r\\n]+/', '', $str), ENT_QUOTES, $this->CharSet) . \" \\n\";\n break;\n case 'echo':\n default:\n echo $str.\"\\n\";\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function pinCommentAction(CustomerComment $comment)\n {\n $comment->setPinned(!$comment->isPinned());\n try {\n $this->repository->saveComment($comment);\n } catch (\\Exception $ex) {\n $this->flashUpdateException($ex);\n }\n\n return $this->redirectToRoute('customer_details', ['id' => $comment->getCustomer()->getId()]);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public static function desc($vars){\n if(!empty($vars)){\n $desc = substr(strip_tags(htmlspecialchars_decode($vars).\". \".Options::get('sitedesc')),0,150);\n }else{\n $desc = substr(Options::get('sitedesc'),0,150);\n }\n \n return $desc;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " function logon($username, $password, &$sessionId)\n {\n global $_POST, $_COOKIE;\n global $strUsernameOrPasswordWrong;\n\n /**\n * @todo Please check if the following statement is in correct place because\n * it seems illogical that user can get session ID from internal login with\n * a bad username or password.\n */\n\n if (!$this->_verifyUsernameAndPasswordLength($username, $password)) {\n return false;\n }\n\n $_POST['username'] = $username;\n $_POST['password'] = $password;\n\n $_POST['login'] = 'Login';\n\n $_COOKIE['sessionID'] = uniqid('phpads', 1);\n $_POST['phpAds_cookiecheck'] = $_COOKIE['sessionID'];\n\n $this->preInitSession();\n if ($this->_internalLogin($username, $password)) {\n // Check if the user has administrator access to Openads.\n if (OA_Permission::isUserLinkedToAdmin()) {\n\n $this->postInitSession();\n\n $sessionId = $_COOKIE['sessionID'];\n return true;\n } else {\n\n $this->raiseError('User must be OA installation admin');\n return false;\n }\n } else {\n\n $this->raiseError($strUsernameOrPasswordWrong);\n return false;\n }\n }", "label_name": "CWE-384", "label": 1}
+{"code": " public static function cat($vars) {\n switch (SMART_URL) {\n case true:\n # code...\n $url = Options::get('siteurl').\"/\".$vars.\"/\".Typo::slugify(Categories::name($vars));\n break;\n \n default:\n # code...\n $url = Options::get('siteurl').\"/index.php?cat={$vars}\";\n break;\n\n }\n\n return $url;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function testPinCommentAction()\n {\n $client = $this->getClientForAuthenticatedUser(User::ROLE_ADMIN);\n $this->assertAccessIsGranted($client, '/admin/project/1/details');\n $form = $client->getCrawler()->filter('form[name=project_comment_form]')->form();\n $client->submit($form, [\n 'project_comment_form' => [\n 'message' => 'Foo bar blub',\n ]\n ]);\n $this->assertIsRedirect($client, $this->createUrl('/admin/project/1/details'));\n $client->followRedirect();\n $node = $client->getCrawler()->filter('div.box#comments_box .direct-chat-text');\n self::assertStringContainsString('Foo bar blub', $node->html());\n $node = $client->getCrawler()->filter('div.box#comments_box .box-body a.btn.active');\n self::assertEquals(0, $node->count());\n\n $comments = $this->getEntityManager()->getRepository(ProjectComment::class)->findAll();\n $id = $comments[0]->getId();\n\n $this->request($client, '/admin/project/' . $id . '/comment_pin');\n $this->assertIsRedirect($client, $this->createUrl('/admin/project/1/details'));\n $client->followRedirect();\n $node = $client->getCrawler()->filter('div.box#comments_box .box-body a.btn.active');\n self::assertEquals(1, $node->count());\n self::assertEquals($this->createUrl('/admin/project/' . $id . '/comment_pin'), $node->attr('href'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function test_invite_set_password()\n {\n Notification::fake();\n $user = $this->getViewer();\n $inviteService = app(UserInviteService::class);\n\n $inviteService->sendInvitation($user);\n $token = DB::table('user_invites')->where('user_id', '=', $user->id)->first()->token;\n\n $setPasswordPageResp = $this->get('/register/invite/' . $token);\n $setPasswordPageResp->assertSuccessful();\n $setPasswordPageResp->assertSee('Welcome to BookStack!');\n $setPasswordPageResp->assertSee('Password');\n $setPasswordPageResp->assertSee('Confirm Password');\n\n $setPasswordResp = $this->followingRedirects()->post('/register/invite/' . $token, [\n 'password' => 'my test password',\n ]);\n $setPasswordResp->assertSee('Password set, you now have access to BookStack!');\n $newPasswordValid = auth()->validate([\n 'email' => $user->email,\n 'password' => 'my test password',\n ]);\n $this->assertTrue($newPasswordValid);\n $this->assertDatabaseMissing('user_invites', [\n 'user_id' => $user->id,\n ]);\n }", "label_name": "CWE-352", "label": 0}
+{"code": "function compression_test() {\n?>\n\t\n\n \n
\n
'. $_SESSION['error_msg'] .'
\n
\n '.\"\\n\";\n unset($_SESSION['error_msg']);\n }\n}", "label_name": "CWE-352", "label": 0}
+{"code": " public function up(RuleGroup $ruleGroup)\n {\n $order = (int)$ruleGroup->order;\n if ($order > 1) {\n $newOrder = $order - 1;\n $this->repository->setOrder($ruleGroup, $newOrder);\n }\n\n return redirect(route('rules.index'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": "function csrf_check($fatal = true)\n{\n if ($_SERVER['REQUEST_METHOD'] !== 'POST') {\n return true;\n }\n csrf_start();\n $name = $GLOBALS['csrf']['input-name'];\n $ok = false;\n $tokens = '';\n do {\n if (!isset($_POST[$name])) {\n break;\n }\n // we don't regenerate a token and check it because some token creation\n // schemes are volatile.\n $tokens = $_POST[$name];\n if (!csrf_check_tokens($tokens)) {\n break;\n }\n $ok = true;\n } while (false);\n if ($fatal && !$ok) {\n $callback = $GLOBALS['csrf']['callback'];\n if (trim($tokens, 'A..Za..z0..9:;,') !== '') {\n $tokens = 'hidden';\n }\n $callback($tokens);\n exit;\n }\n return $ok;\n}", "label_name": "CWE-352", "label": 0}
+{"code": "\t\tfunction verifyCSRFToken() {\n\t\t\t$clean_referer = str_replace(array(\"http://\",\"https://\"),\"//\",$_SERVER[\"HTTP_REFERER\"]);\n\t\t\t$clean_domain = str_replace(array(\"http://\",\"https://\"),\"//\",DOMAIN);\n\t\t\t$token = isset($_POST[$this->CSRFTokenField]) ? $_POST[$this->CSRFTokenField] : $_GET[$this->CSRFTokenField];\n\t\t\t\n\t\t\tif (strpos($clean_referer, $clean_domain) === false || $token != $this->CSRFToken) {\n\t\t\t\t$this->stop(\"Cross site request forgery detected.\");\n\t\t\t}\n\t\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function update(){\n $login_user = $this->checkLogin();\n $item_id = I(\"item_id/d\"); \n $item_name = I(\"item_name\"); \n $item_description = I(\"item_description\"); \n $item_domain = I(\"item_domain\"); \n $password = I(\"password\");\n $uid = $login_user['uid'] ;\n if(!$this->checkItemManage($uid , $item_id)){\n $this->sendError(10303);\n return ;\n }\n\n if ($item_domain) {\n \n if(!ctype_alnum($item_domain) || is_numeric($item_domain) ){\n //echo '\u4e2a\u6027\u57df\u540d\u53ea\u80fd\u662f\u5b57\u6bcd\u6216\u6570\u5b57\u7684\u7ec4\u5408';exit;\n $this->sendError(10305);\n return false;\n }\n\n $item = D(\"Item\")->where(\"item_domain = '%s' and item_id !='%s' \",array($item_domain,$item_id))->find();\n if ($item) {\n //\u4e2a\u6027\u57df\u540d\u5df2\u7ecf\u5b58\u5728\n $this->sendError(10304);\n return false;\n }\n }\n $save_data = array(\n \"item_name\" => $item_name ,\n \"item_description\" => $item_description ,\n \"item_domain\" => $item_domain ,\n \"password\" => $password ,\n );\n $items = D(\"Item\")->where(\"item_id = '$item_id' \")->save($save_data);\n $items = $items ? $items : array();\n $this->sendResult($items); \n }", "label_name": "CWE-352", "label": 0}
+{"code": "function clean_input_value($value) {\n if (is_string($value)) {\n return descript($value);\n }\n if (is_array($value)) {\n return array_map('descript', $value);\n }\n return '';\n}", "label_name": "CWE-352", "label": 0}
+{"code": " public function testDeleteCommentAction()\n {\n $client = $this->getClientForAuthenticatedUser(User::ROLE_ADMIN);\n $this->assertAccessIsGranted($client, '/admin/customer/1/details');\n $form = $client->getCrawler()->filter('form[name=customer_comment_form]')->form();\n $client->submit($form, [\n 'customer_comment_form' => [\n 'message' => 'Blah foo bar',\n ]\n ]);\n $this->assertIsRedirect($client, $this->createUrl('/admin/customer/1/details'));\n $client->followRedirect();\n $node = $client->getCrawler()->filter('div.box#comments_box .direct-chat-msg');\n self::assertStringContainsString('Blah foo bar', $node->html());\n $node = $client->getCrawler()->filter('div.box#comments_box .box-body a.confirmation-link');\n self::assertStringEndsWith('/comment_delete', $node->attr('href'));\n\n $comments = $this->getEntityManager()->getRepository(CustomerComment::class)->findAll();\n $id = $comments[0]->getId();\n\n $this->request($client, '/admin/customer/' . $id . '/comment_delete');\n $this->assertIsRedirect($client, $this->createUrl('/admin/customer/1/details'));\n $client->followRedirect();\n $node = $client->getCrawler()->filter('div.box#comments_box .box-body');\n self::assertStringContainsString('There were no comments posted yet', $node->html());\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function cloneGroup(TransactionGroup $group)\n {\n\n /** @var GroupCloneService $service */\n $service = app(GroupCloneService::class);\n $newGroup = $service->cloneGroup($group);\n\n // event!\n event(new StoredTransactionGroup($newGroup));\n\n app('preferences')->mark();\n\n $title = $newGroup->title ?? $newGroup->transactionJournals->first()->description;\n $link = route('transactions.show', [$newGroup->id]);\n session()->flash('success', trans('firefly.stored_journal', ['description' => $title]));\n session()->flash('success_url', $link);\n\n return redirect(route('transactions.show', [$newGroup->id]));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function changePassword(){\n $login_user = $this->checkLogin();\n $this->checkAdmin();\n $uid = I(\"uid/d\");\n $new_password = I(\"new_password\");\n\n $return = D(\"User\")->updatePwd($uid, $new_password);\n if (!$return) {\n $this->sendError(10101);\n }else{\n $this->sendResult($return);\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function save(){\n $login_user = $this->checkLogin();\n\n $team_name = I(\"team_name\");\n $id = I(\"id/d\");\n\n if ($id) {\n \n D(\"Team\")->where(\" id = '$id' \")->save(array(\"team_name\"=>$team_name));\n\n }else{\n $data['username'] = $login_user['username'] ;\n $data['uid'] = $login_user['uid'] ;\n $data['team_name'] = $team_name ;\n $data['addtime'] = time() ;\n $id = D(\"Team\")->add($data); \n }\n\n $return = D(\"Team\")->where(\" id = '$id' \")->find();\n\n if (!$return) {\n $return['error_code'] = 10103 ;\n $return['error_message'] = 'request fail' ;\n }\n\n $this->sendResult($return);\n \n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function loadUserByUsername($username)\n {\n return $this->inner->loadUserByUsername($username);\n }", "label_name": "CWE-384", "label": 1}
+{"code": " public function delete(AvailableBudget $availableBudget)\n {\n $this->abRepository->destroyAvailableBudget($availableBudget);\n session()->flash('success', trans('firefly.deleted_ab'));\n\n return redirect(route('budgets.index'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public static function isHadSub($parent, $menuid =''){\n $sql = sprintf(\"SELECT * FROM `menus` WHERE `parent` = '%s' %s\", $parent, $where);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function confirm(string $token)\n {\n try {\n $userId = $this->emailConfirmationService->checkTokenAndGetUserId($token);\n } catch (UserTokenNotFoundException $exception) {\n $this->showErrorNotification(trans('errors.email_confirmation_invalid'));\n\n return redirect('/register');\n } catch (UserTokenExpiredException $exception) {\n $user = $this->userRepo->getById($exception->userId);\n $this->emailConfirmationService->sendConfirmation($user);\n $this->showErrorNotification(trans('errors.email_confirmation_expired'));\n\n return redirect('/register/confirm');\n }\n\n $user = $this->userRepo->getById($userId);\n $user->email_confirmed = true;\n $user->save();\n\n $this->emailConfirmationService->deleteByUser($user);\n $this->showSuccessNotification(trans('auth.email_confirm_success'));\n $this->loginService->login($user, auth()->getDefaultDriver());\n\n return redirect('/');\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function down(RuleGroup $ruleGroup)\n {\n $maxOrder = $this->repository->maxOrder();\n $order = (int)$ruleGroup->order;\n if ($order < $maxOrder) {\n $newOrder = $order + 1;\n $this->repository->setOrder($ruleGroup, $newOrder);\n }\n\n return redirect(route('rules.index'));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " $logo = \"\";\n }else{\n $logo = \"\";\n }\n return $logo;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public function delete(){\n $id = I(\"id/d\")? I(\"id/d\") : 0;\n $login_user = $this->checkLogin();\n if ($id && $login_user['uid']) {\n $ret = D(\"Team\")->where(\" id = '$id' and uid = '$login_user[uid]'\")->delete();\n }\n if ($ret) {\n D(\"TeamItem\")->where(\" team_id = '$id' \")->delete();\n D(\"TeamItemMember\")->where(\" team_id = '$id' \")->delete();\n D(\"TeamMember\")->where(\" team_id = '$id' \")->delete();\n $this->sendResult($ret);\n }else{\n $return['error_code'] = 10103 ;\n $return['error_message'] = 'request fail' ;\n $this->sendResult($return);\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": "\t\tpublic function init()\n\t\t{\n\n\t\t\tif(!e_QUERY)\n\t\t\t{\n\t\t\t\te107::getPlug()->clearCache();\n\t\t\t}\n\n\n\n\t\t\tif($this->getMode()=== 'avail')\n\t\t\t{\n\t\t\t\t$this->listQry = \"SELECT * FROM `#plugin` WHERE plugin_installflag = 0 AND plugin_category != 'menu' \";\n\t\t\t}\n\n\t\t\t// Set drop-down values (if any).\n\n\t\t}", "label_name": "CWE-352", "label": 0}
+{"code": "function ttMitigateCSRF() {\n // No need to do anything for get requests.\n global $request;\n if ($request->isGet())\n return true;\n\n $origin = $_SERVER['HTTP_ORIGIN'];\n if ($origin) {\n $pos = strpos($origin, '//');\n $origin = substr($origin, $pos+2); // Strip protocol.\n }\n if (!$origin) {\n // Try using referer.\n $origin = $_SERVER['HTTP_REFERER'];\n if ($origin) {\n $pos = strpos($origin, '//');\n $origin = substr($origin, $pos+2); // Strip protocol.\n $pos = strpos($origin, '/');\n $origin = substr($origin, 0, $pos); // Leave host only.\n }\n }\n error_log(\"origin: \".$origin);\n $target = defined('HTTP_TARGET') ? HTTP_TARGET : $_SERVER['HTTP_HOST'];\n error_log(\"target: \".$target);\n if (strcmp($origin, $target)) {\n error_log(\"Potential cross site request forgery. Origin: '$origin' does not match target: '$target'.\");\n return false; // Origin and target do not match,\n }\n\n // TODO: review and improve this function for custom ports.\n return true;\n}", "label_name": "CWE-352", "label": 0}
+{"code": " public function refreshUser(UserInterface $user)\n {\n $user = $this->inner->refreshUser($user);\n\n $alterUser = \\Closure::bind(function (InMemoryUser $user) { $user->password = 'foo'; }, null, class_exists(User::class) ? User::class : InMemoryUser::class);\n $alterUser($user);\n\n return $user;\n }", "label_name": "CWE-384", "label": 1}
+{"code": "\t\t\\CsrfMagic\\Csrf::$callback = function ($tokens) {\n\t\t\tthrow new \\App\\Exceptions\\AppException('Invalid request - Response For Illegal Access', 403);\n\t\t};", "label_name": "CWE-352", "label": 0}
+{"code": "\tpublic static function simple($input)\n\t{\n\t\treturn empty($str) ? '' : pts_strings::keep_in_string($input, pts_strings::CHAR_LETTER | pts_strings::CHAR_NUMERIC | pts_strings::CHAR_DASH | pts_strings::CHAR_DECIMAL | pts_strings::CHAR_SPACE | pts_strings::CHAR_UNDERSCORE | pts_strings::CHAR_COMMA | pts_strings::CHAR_AT | pts_strings::CHAR_COLON);\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function deleteByName(){\n $item_id = I(\"item_id/d\"); \n $env_id = I(\"env_id/d\"); \n $var_name = I(\"var_name\"); \n $login_user = $this->checkLogin();\n $uid = $login_user['uid'] ;\n if(!$this->checkItemEdit($uid , $item_id)){\n $this->sendError(10303);\n return ;\n } \n $ret = D(\"ItemVariable\")->where(\" item_id = '%d' and env_id = '%d' and var_name = '%s' \",array($item_id,$env_id,$var_name))->delete();\n if ($ret) {\n $this->sendResult($ret);\n }else{\n $this->sendError(10101);\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": "\tpublic function test_create_nonce_url() {\n $url = yourls_nonce_url( rand_str(), rand_str(), rand_str(), rand_str() );\n $this->assertTrue( is_string($url) );\n // $this->assertIsString($url);\n }", "label_name": "CWE-352", "label": 0}
+{"code": "\tpublic function AdminObserver()\r\n\t{\r\n\t\tif($this->getPosted('go_back'))\r\n\t\t{\r\n\t\t\t$this->redirect('list', 'main', true);\r\n\t\t}\r\n\t\t\r\n\t\t$userid = $this->getId();\r\n\t\t$sql = e107::getDb();\r\n\t\t$user = e107::getUser();\r\n\t\t$sysuser = e107::getSystemUser($userid, false);\r\n\t\t$admin_log = e107::getAdminLog();\r\n\t\t$mes = e107::getMessage();\r\n\t\t\r\n\t\tif(!$user->checkAdminPerms('3'))\r\n\t\t{\r\n\t\t\t// TODO lan\r\n\t\t\t$mes->addError(\"You don't have enough permissions to do this.\", 'default', true);\r\n\t\t\t// TODO lan\r\n\t\t\t$lan = 'Security violation (not enough permissions) - Administrator --ADMIN_UID-- (--ADMIN_NAME--, --ADMIN_EMAIL--) tried to make --UID-- (--NAME--, --EMAIL--) system admin';\r\n\t\t\t$search = array('--UID--', '--NAME--', '--EMAIL--', '--ADMIN_UID--', '--ADMIN_NAME--', '--ADMIN_EMAIL--');\r\n\t\t\t$replace = array($sysuser->getId(), $sysuser->getName(), $sysuser->getValue('email'), $user->getId(), $user->getName(), $user->getValue('email'));\r\n\t\t\t\r\n\t\t\te107::getLog()->add('USET_08', str_replace($search, $replace, $lan), E_LOG_INFORMATIVE);\r\n\t\t\t\r\n\t\t\t$this->redirect('list', 'main', true);\r\n\t\t}\r\n\t\t\r\n\t\tif(!$sysuser->getId())\r\n\t\t{\r\n\t\t\t// TODO lan\r\n\t\t\t$mes->addError(\"User not found.\", 'default', true);\r\n\t\t\t$this->redirect('list', 'main', true);\r\n\t\t}\r\n\t\t\r\n\t\tif(!$sysuser->isAdmin())\r\n\t\t{\r\n\t\t\t$sysuser->set('user_admin', 1)->save(); //\"user\",\"user_admin='1' WHERE user_id={$userid}\"\r\n\t\t\t$lan = str_replace(array('--UID--', '--NAME--', '--EMAIL--'), array($sysuser->getId(), $sysuser->getName(), $sysuser->getValue('email')), USRLAN_164);\r\n\t\t\te107::getLog()->add('USET_08', $lan, E_LOG_INFORMATIVE);\r\n\t\t\t$mes->addSuccess($lan);\r\n\t\t}\r\n\t\t\r\n\t\tif($this->getPosted('update_admin')) e107::getUserPerms()->updatePerms($userid, $_POST['perms']);\r\n\t}\r", "label_name": "CWE-352", "label": 0}
+{"code": " public function handle(Request $request, Closure $next, int $keyType)\n {\n if (is_null($request->bearerToken()) && is_null($request->user())) {\n throw new HttpException(401, null, null, ['WWW-Authenticate' => 'Bearer']);\n }\n\n // This is a request coming through using cookies, we have an authenticated user\n // not using an API key. Make some fake API key models and continue on through\n // the process.\n if ($request->user() instanceof User) {\n $model = (new ApiKey())->forceFill([\n 'user_id' => $request->user()->id,\n 'key_type' => ApiKey::TYPE_ACCOUNT,\n ]);\n } else {\n $model = $this->authenticateApiKey($request->bearerToken(), $keyType);\n\n $this->auth->guard()->loginUsingId($model->user_id);\n }\n\n $request->attributes->set('api_key', $model);\n\n return $next($request);\n }", "label_name": "CWE-352", "label": 0}
+{"code": "\tpublic function __construct()\n\t{\n\t\tparent::__construct();\n\n\t\t// for flash data\n\t\t$this->load->library('session');\n\n\t\tif (!$this->fuel->config('admin_enabled')) show_404();\n\n\t\t$this->load->vars(array(\n\t\t\t'js' => '', \n\t\t\t'css' => css($this->fuel->config('xtra_css')), // use CSS function here because of the asset library path changes below\n\t\t\t'js_controller_params' => array(), \n\t\t\t'keyboard_shortcuts' => $this->fuel->config('keyboard_shortcuts')));\n\n\t\t// change assets path to admin\n\t\t$this->asset->assets_path = $this->fuel->config('fuel_assets_path');\n\n\t\t// set asset output settings\n\t\t$this->asset->assets_output = $this->fuel->config('fuel_assets_output');\n\t\t\n\t\t$this->lang->load('fuel');\n\t\t$this->load->helper('ajax');\n\t\t$this->load->library('form_builder');\n\n\t\t$this->load->module_model(FUEL_FOLDER, 'fuel_users_model');\n\n\t\t// set configuration paths for assets in case they are different from front end\n\t\t$this->asset->assets_module ='fuel';\n\t\t$this->asset->assets_folders = array(\n\t\t\t\t'images' => 'images/',\n\t\t\t\t'css' => 'css/',\n\t\t\t\t'js' => 'js/',\n\t\t\t);\n\n\t}", "label_name": "CWE-352", "label": 0}
+{"code": " public function notify_edge_mode() {\n w3_require_once(W3TC_INC_FUNCTIONS_DIR . '/ui.php');\n w3_require_once(W3TC_INC_FUNCTIONS_DIR . '/admin_ui.php');\n $message = sprintf(__('
You can now keep W3 Total Cache up-to-date without having to worry about new features breaking your website. There will be more releases with bug fixes, security fixes and settings updates.
\n
Also, you can now try out our new features as soon as they\\'re ready. %s to enable \"edge mode\" and unlock pre-release features. %s
\",\n s->name,\n s->monitor ? \"unmonitor\" : \"monitor\",\n s->monitor ? \"Disable monitoring\" : \"Enable monitoring\");\n}", "label_name": "CWE-352", "label": 0}
+{"code": "static void handle_run(HttpRequest req, HttpResponse res) {\n const char *action = get_parameter(req, \"action\");\n if (action) {\n if (is_readonly(req)) {\n send_error(req, res, SC_FORBIDDEN, \"You do not have sufficient privileges to access this page\");\n return;\n }\n if (IS(action, \"validate\")) {\n LogInfo(\"The Monit http server woke up on user request\\n\");\n do_wakeupcall();\n } else if (IS(action, \"stop\")) {\n LogInfo(\"The Monit http server stopped on user request\\n\");\n send_error(req, res, SC_SERVICE_UNAVAILABLE, \"The Monit http server is stopped\");\n Engine_stop();\n return;\n }\n }\n LOCK(Run.mutex)\n do_runtime(req, res);\n END_LOCK;\n}", "label_name": "CWE-352", "label": 0}
+{"code": "void set_header(HttpResponse res, const char *name, const char *value) {\n HttpHeader h = NULL;\n\n ASSERT(res);\n ASSERT(name);\n\n NEW(h);\n h->name = Str_dup(name);\n h->value = Str_dup(value);\n if (res->headers) {\n HttpHeader n, p;\n for (n = p = res->headers; p; n = p, p = p->next) {\n if (IS(p->name, name)) {\n FREE(p->value);\n p->value = Str_dup(value);\n destroy_entry(h);\n return;\n }\n }\n n->next = h;\n } else {\n res->headers = h;\n }\n}", "label_name": "CWE-352", "label": 0}
+{"code": "static void doGet(HttpRequest req, HttpResponse res) {\n set_content_type(res, \"text/html\");\n if (ACTION(HOME)) {\n LOCK(Run.mutex)\n do_home(res);\n END_LOCK;\n } else if (ACTION(RUN)) {\n handle_run(req, res);\n } else if (ACTION(TEST)) {\n is_monit_running(res);\n } else if (ACTION(VIEWLOG)) {\n do_viewlog(req, res);\n } else if (ACTION(ABOUT)) {\n do_about(res);\n } else if (ACTION(FAVICON)) {\n printFavicon(res);\n } else if (ACTION(PING)) {\n do_ping(res);\n } else if (ACTION(GETID)) {\n do_getid(res);\n } else if (ACTION(STATUS)) {\n print_status(req, res, 1);\n } else if (ACTION(STATUS2)) {\n print_status(req, res, 2);\n } else if (ACTION(SUMMARY)) {\n print_summary(req, res);\n } else if (ACTION(REPORT)) {\n _printReport(req, res);\n } else if (ACTION(DOACTION)) {\n handle_do_action(req, res);\n } else {\n handle_action(req, res);\n }\n}", "label_name": "CWE-352", "label": 0}
+{"code": "void set_content_type(HttpResponse res, const char *mime) {\n set_header(res, \"Content-Type\", mime);\n}", "label_name": "CWE-352", "label": 0}
+{"code": "static void handle_action(HttpRequest req, HttpResponse res) {\n char *name = req->url;\n Service_T s = Util_getService(++name);\n if (! s) {\n send_error(req, res, SC_NOT_FOUND, \"There is no service named \\\"%s\\\"\", name ? name : \"\");\n return;\n }\n const char *action = get_parameter(req, \"action\");\n if (action) {\n if (is_readonly(req)) {\n send_error(req, res, SC_FORBIDDEN, \"You do not have sufficient privileges to access this page\");\n return;\n }\n Action_Type doaction = Util_getAction(action);\n if (doaction == Action_Ignored) {\n send_error(req, res, SC_BAD_REQUEST, \"Invalid action \\\"%s\\\"\", action);\n return;\n }\n s->doaction = doaction;\n const char *token = get_parameter(req, \"token\");\n if (token) {\n FREE(s->token);\n s->token = Str_dup(token);\n }\n LogInfo(\"'%s' %s on user request\\n\", s->name, action);\n Run.flags |= Run_ActionPending; /* set the global flag */\n do_wakeupcall();\n }\n do_service(req, res, s);\n}", "label_name": "CWE-352", "label": 0}
+{"code": " def test_invoice_payment_is_still_pending_for_registration_codes(self):\n \"\"\"\n test generate enrollment report\n enroll a user in a course using registration code\n whose invoice has not been paid yet\n \"\"\"\n course_registration_code = CourseRegistrationCode.objects.create(\n code='abcde',\n course_id=self.course.id.to_deprecated_string(),\n created_by=self.instructor,\n invoice=self.sale_invoice_1,\n invoice_item=self.invoice_item,\n mode_slug='honor'\n )\n\n test_user1 = UserFactory()\n self.register_with_redemption_code(test_user1, course_registration_code.code)\n\n CourseFinanceAdminRole(self.course.id).add_users(self.instructor)\n self.client.login(username=self.instructor.username, password='test')\n\n url = reverse('get_enrollment_report', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {})\n self.assertIn('The detailed enrollment report is being created.', response.content)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_allow_with_uname(self):\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.other_instructor.username,\n 'rolename': 'staff',\n 'action': 'allow',\n })\n self.assertEqual(response.status_code, 200)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_student_progress_url_nostudent(self):\n \"\"\" Test that the endpoint 400's when requesting an unknown email. \"\"\"\n url = reverse('get_student_progress_url', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url)\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_post_only(self):\n \"\"\"\n Verify that we can't call the view when we aren't using POST.\n \"\"\"\n self.client.login(username=self.staff_user.username, password='test')\n response = self.call_add_users_to_cohorts('', method='GET')\n self.assertEqual(response.status_code, 405)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_entrance_exam_instructor_tasks_all_student(self):\n \"\"\" Test list task history for entrance exam AND all student. \"\"\"\n url = reverse('list_entrance_exam_instructor_tasks', kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {})\n self.assertEqual(response.status_code, 200)\n\n # check response\n tasks = json.loads(response.content)['tasks']\n self.assertEqual(len(tasks), 0)", "label_name": "CWE-352", "label": 0}
+{"code": "def list_course_role_members(request, course_id):\n \"\"\"\n List instructors and staff.\n Requires instructor access.\n\n rolename is one of ['instructor', 'staff', 'beta', 'ccx_coach']\n\n Returns JSON of the form {\n \"course_id\": \"some/course/id\",\n \"staff\": [\n {\n \"username\": \"staff1\",\n \"email\": \"staff1@example.org\",\n \"first_name\": \"Joe\",\n \"last_name\": \"Shmoe\",\n }\n ]\n }\n \"\"\"\n course_id = SlashSeparatedCourseKey.from_deprecated_string(course_id)\n course = get_course_with_access(\n request.user, 'instructor', course_id, depth=None\n )\n\n rolename = request.GET.get('rolename')\n\n if rolename not in ROLES:\n return HttpResponseBadRequest()\n\n def extract_user_info(user):\n \"\"\" convert user into dicts for json view \"\"\"\n return {\n 'username': user.username,\n 'email': user.email,\n 'first_name': user.first_name,\n 'last_name': user.last_name,\n }\n\n response_payload = {\n 'course_id': course_id.to_deprecated_string(),\n rolename: map(extract_user_info, list_with_level(\n course, rolename\n )),\n }\n return JsonResponse(response_payload)", "label_name": "CWE-352", "label": 0}
+{"code": "def test_get_delete_dataobj(test_app, client: FlaskClient, note_fixture):\n response = client.get(\"/dataobj/delete/1\")\n assert response.status_code == 302", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_entrance_exam_instructor_with_invalid_exam_key(self):\n \"\"\" Test list task history for entrance exam failure if course has invalid exam. \"\"\"\n url = reverse('list_entrance_exam_instructor_tasks',\n kwargs={'course_id': unicode(self.course_with_invalid_ee.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_course_has_entrance_exam_in_student_attempts_reset(self):\n \"\"\" Test course has entrance exam id set while resetting attempts\"\"\"\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'all_students': True,\n 'delete_module': False,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_show_student_extensions(self):\n self.test_change_due_date()\n url = reverse('show_student_extensions',\n kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {'student': self.user1.username})\n self.assertEqual(response.status_code, 200, response.content)\n self.assertEqual(json.loads(response.content), {\n u'data': [{u'Extended Due Date': u'2013-12-30 00:00',\n u'Unit': self.week1.display_name}],\n u'header': [u'Unit', u'Extended Due Date'],\n u'title': u'Due date extensions for %s (%s)' % (\n self.user1.profile.name, self.user1.username)})", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_course_role_members_staff(self):\n url = reverse('list_course_role_members', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'rolename': 'staff',\n })\n self.assertEqual(response.status_code, 200)\n\n # check response content\n expected = {\n 'course_id': self.course.id.to_deprecated_string(),\n 'staff': [\n {\n 'username': self.other_staff.username,\n 'email': self.other_staff.email,\n 'first_name': self.other_staff.first_name,\n 'last_name': self.other_staff.last_name,\n }\n ]\n }\n res_json = json.loads(response.content)\n self.assertEqual(res_json, expected)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_student_attempts_single(self):\n \"\"\" Test reset single student attempts. \"\"\"\n url = reverse('reset_student_attempts', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': self.problem_urlname,\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 200)\n # make sure problem attempts have been reset.\n changed_module = StudentModule.objects.get(pk=self.module_to_reset.pk)\n self.assertEqual(\n json.loads(changed_module.state)['attempts'],\n 0\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_nonexistent_extension(self):\n url = reverse('reset_due_date', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'student': self.user1.username,\n 'url': self.week1.location.to_deprecated_string(),\n })\n self.assertEqual(response.status_code, 400, response.content)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_date(self):\n self.test_change_due_date()\n url = reverse('reset_due_date', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'student': self.user1.username,\n 'url': self.week1.location.to_deprecated_string(),\n })\n self.assertEqual(response.status_code, 200, response.content)\n self.assertEqual(\n None,\n get_extended_due(self.course, self.week1, self.user1)\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_course_role_members_noparams(self):\n \"\"\" Test missing all query parameters. \"\"\"\n url = reverse('list_course_role_members', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url)\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_ora2_responses_success(self):\n url = reverse('export_ora2_data', kwargs={'course_id': unicode(self.course.id)})\n\n with patch('instructor_task.api.submit_export_ora2_data') as mock_submit_ora2_task:\n mock_submit_ora2_task.return_value = True\n response = self.client.get(url, {})\n success_status = \"The ORA data report is being generated.\"\n self.assertIn(success_status, response.content)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_extension_to_deleted_date(self):\n \"\"\"\n Test that we can delete a due date extension after deleting the normal\n due date, without causing an error.\n \"\"\"\n\n url = reverse('change_due_date', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'student': self.user1.username,\n 'url': self.week1.location.to_deprecated_string(),\n 'due_datetime': '12/30/2013 00:00'\n })\n self.assertEqual(response.status_code, 200, response.content)\n self.assertEqual(datetime.datetime(2013, 12, 30, 0, 0, tzinfo=utc),\n get_extended_due(self.course, self.week1, self.user1))\n\n self.week1.due = None\n self.week1 = self.store.update_item(self.week1, self.user1.id)\n # Now, week1's normal due date is deleted but the extension still exists.\n url = reverse('reset_due_date', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'student': self.user1.username,\n 'url': self.week1.location.to_deprecated_string(),\n })\n self.assertEqual(response.status_code, 200, response.content)\n self.assertEqual(\n None,\n get_extended_due(self.course, self.week1, self.user1)\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_with_inactive_user(self):\n self.other_user.is_active = False\n self.other_user.save() # pylint: disable=no-member\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.other_user.username,\n 'rolename': 'beta',\n 'action': 'allow',\n })\n self.assertEqual(response.status_code, 200)\n expected = {\n 'unique_student_identifier': self.other_user.username,\n 'inactiveUser': True,\n }\n res_json = json.loads(response.content)\n self.assertEqual(res_json, expected)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_certificates_features_against_status(self):\n \"\"\"\n Test certificates with status 'downloadable' should be in the response.\n \"\"\"\n url = reverse('get_issued_certificates', kwargs={'course_id': unicode(self.course.id)})\n # firstly generating downloadable certificates with 'honor' mode\n certificate_count = 3\n for __ in xrange(certificate_count):\n self.generate_certificate(course_id=self.course.id, mode='honor', status=CertificateStatuses.generating)\n\n response = self.client.get(url)\n res_json = json.loads(response.content)\n self.assertIn('certificates', res_json)\n self.assertEqual(len(res_json['certificates']), 0)\n\n # Certificates with status 'downloadable' should be in response.\n self.generate_certificate(course_id=self.course.id, mode='honor', status=CertificateStatuses.downloadable)\n response = self.client.get(url)\n res_json = json.loads(response.content)\n self.assertIn('certificates', res_json)\n self.assertEqual(len(res_json['certificates']), 1)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_calculate_report_csv_success(self, report_type, instructor_api_endpoint, task_api_endpoint, extra_instructor_api_kwargs):\n kwargs = {'course_id': unicode(self.course.id)}\n kwargs.update(extra_instructor_api_kwargs)\n url = reverse(instructor_api_endpoint, kwargs=kwargs)\n success_status = \"The {report_type} report is being created.\".format(report_type=report_type)\n if report_type == 'problem responses':\n with patch(task_api_endpoint):\n response = self.client.get(url, {'problem_location': ''})\n self.assertIn(success_status, response.content)\n else:\n CourseFinanceAdminRole(self.course.id).add_users(self.instructor)\n with patch(task_api_endpoint):\n response = self.client.get(url, {})\n self.assertIn(success_status, response.content)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_entrance_exam_instructor_tasks_student(self):\n \"\"\" Test list task history for entrance exam AND student. \"\"\"\n # create a re-score entrance exam task\n url = reverse('rescore_entrance_exam', kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 200)\n\n url = reverse('list_entrance_exam_instructor_tasks', kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 200)\n\n # check response\n tasks = json.loads(response.content)['tasks']\n self.assertEqual(len(tasks), 1)\n self.assertEqual(tasks[0]['status'], _('Complete'))", "label_name": "CWE-352", "label": 0}
+{"code": "def qute_settings(url):\n \"\"\"Handler for qute://settings. View/change qute configuration.\"\"\"\n if url.path() == '/set':\n return _qute_settings_set(url)\n\n src = jinja.render('settings.html', title='settings',\n configdata=configdata,\n confget=config.instance.get_str)\n return 'text/html', src", "label_name": "CWE-352", "label": 0}
+{"code": " def test_change_to_invalid_due_date(self):\n url = reverse('change_due_date', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'student': self.user1.username,\n 'url': self.week1.location.to_deprecated_string(),\n 'due_datetime': '01/01/2009 00:00'\n })\n self.assertEqual(response.status_code, 400, response.content)\n self.assertEqual(\n None,\n get_extended_due(self.course, self.week1, self.user1)\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def assert_update_forum_role_membership(self, current_user, identifier, rolename, action):\n \"\"\"\n Test update forum role membership.\n Get unique_student_identifier, rolename and action and update forum role.\n \"\"\"\n url = reverse('update_forum_role_membership', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(\n url,\n {\n 'unique_student_identifier': identifier,\n 'rolename': rolename,\n 'action': action,\n }\n )\n\n # Status code should be 200.\n self.assertEqual(response.status_code, 200)\n\n user_roles = current_user.roles.filter(course_id=self.course.id).values_list(\"name\", flat=True)\n if action == 'allow':\n self.assertIn(rolename, user_roles)\n elif action == 'revoke':\n self.assertNotIn(rolename, user_roles)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_with_fake_user(self):\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': 'GandalfTheGrey',\n 'rolename': 'staff',\n 'action': 'revoke',\n })\n self.assertEqual(response.status_code, 200)\n expected = {\n 'unique_student_identifier': 'GandalfTheGrey',\n 'userDoesNotExist': True,\n }\n res_json = json.loads(response.content)\n self.assertEqual(res_json, expected)", "label_name": "CWE-352", "label": 0}
+{"code": "def require_post_params(*args, **kwargs):\n \"\"\"\n Checks for required parameters or renders a 400 error.\n (decorator with arguments)\n\n Functions like 'require_query_params', but checks for\n POST parameters rather than GET parameters.\n \"\"\"\n required_params = []\n required_params += [(arg, None) for arg in args]\n required_params += [(key, kwargs[key]) for key in kwargs]\n # required_params = e.g. [('action', 'enroll or unenroll'), ['emails', None]]\n\n def decorator(func): # pylint: disable=missing-docstring\n def wrapped(*args, **kwargs): # pylint: disable=missing-docstring\n request = args[0]\n\n error_response_data = {\n 'error': 'Missing required query parameter(s)',\n 'parameters': [],\n 'info': {},\n }\n\n for (param, extra) in required_params:\n default = object()\n if request.POST.get(param, default) == default:\n error_response_data['parameters'].append(param)\n error_response_data['info'][param] = extra\n\n if len(error_response_data['parameters']) > 0:\n return JsonResponse(error_response_data, status=400)\n else:\n return func(*args, **kwargs)\n return wrapped\n return decorator", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_anon_ids(self):\n \"\"\"\n Test the CSV output for the anonymized user ids.\n \"\"\"\n url = reverse('get_anon_ids', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {})\n self.assertEqual(response['Content-Type'], 'text/csv')\n body = response.content.replace('\\r', '')\n self.assertTrue(body.startswith(\n '\"User ID\",\"Anonymized User ID\",\"Course Specific Anonymized User ID\"'\n '\\n\"{user_id}\",\"41\",\"42\"\\n'.format(user_id=self.students[0].id)\n ))\n self.assertTrue(\n body.endswith('\"{user_id}\",\"41\",\"42\"\\n'.format(user_id=self.students[-1].id))\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_rescore_problem_all(self, act):\n \"\"\" Test rescoring for all students. \"\"\"\n url = reverse('rescore_problem', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': self.problem_urlname,\n 'all_students': True,\n })\n self.assertEqual(response.status_code, 200)\n self.assertTrue(act.called)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_students_features_cohorted(self, is_cohorted):\n \"\"\"\n Test that get_students_features includes cohort info when the course is\n cohorted, and does not when the course is not cohorted.\n \"\"\"\n url = reverse('get_students_features', kwargs={'course_id': unicode(self.course.id)})\n set_course_cohort_settings(self.course.id, is_cohorted=is_cohorted)\n\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n\n self.assertEqual('cohort' in res_json['feature_names'], is_cohorted)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_revoke_not_allowed(self):\n \"\"\" Test revoking access that a user does not have. \"\"\"\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.other_staff.email,\n 'rolename': 'instructor',\n 'action': 'revoke',\n })\n self.assertEqual(response.status_code, 200)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_rescore_entrance_exam_single_student(self, act):\n \"\"\" Test re-scoring of entrance exam for single student. \"\"\"\n url = reverse('rescore_entrance_exam', kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 200)\n self.assertTrue(act.called)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_ora2_responses_already_running(self):\n url = reverse('export_ora2_data', kwargs={'course_id': unicode(self.course.id)})\n\n with patch('instructor_task.api.submit_export_ora2_data') as mock_submit_ora2_task:\n mock_submit_ora2_task.side_effect = AlreadyRunningError()\n response = self.client.get(url, {})\n already_running_status = \"An ORA data report generation task is already in progress.\"\n self.assertIn(already_running_status, response.content)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_revoke_self(self):\n \"\"\"\n Test that an instructor cannot remove instructor privelages from themself.\n \"\"\"\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.instructor.email,\n 'rolename': 'instructor',\n 'action': 'revoke',\n })\n self.assertEqual(response.status_code, 200)\n # check response content\n expected = {\n 'unique_student_identifier': self.instructor.username,\n 'rolename': 'instructor',\n 'action': 'revoke',\n 'removingSelfAsInstructor': True,\n }\n res_json = json.loads(response.content)\n self.assertEqual(res_json, expected)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_report_downloads(self):\n url = reverse('list_report_downloads', kwargs={'course_id': self.course.id.to_deprecated_string()})\n with patch('instructor_task.models.LocalFSReportStore.links_for') as mock_links_for:\n mock_links_for.return_value = [\n ('mock_file_name_1', 'https://1.mock.url'),\n ('mock_file_name_2', 'https://2.mock.url'),\n ]\n response = self.client.get(url, {})\n\n expected_response = {\n \"downloads\": [\n {\n \"url\": \"https://1.mock.url\",\n \"link\": \"mock_file_name_1\",\n \"name\": \"mock_file_name_1\"\n },\n {\n \"url\": \"https://2.mock.url\",\n \"link\": \"mock_file_name_2\",\n \"name\": \"mock_file_name_2\"\n }\n ]\n }\n res_json = json.loads(response.content)\n self.assertEqual(res_json, expected_response)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_entrance_exam_sttudent_delete_state(self):\n \"\"\" Test delete single student entrance exam state. \"\"\"\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n 'delete_module': True,\n })\n self.assertEqual(response.status_code, 200)\n # make sure the module has been deleted\n changed_modules = StudentModule.objects.filter(module_state_key__in=self.ee_modules)\n self.assertEqual(changed_modules.count(), 0)", "label_name": "CWE-352", "label": 0}
+{"code": "def test_get_delete_dataobj_not_found(test_app, client: FlaskClient):\n response = client.get(\"/dataobj/delete/1\")\n assert response.status_code == 302", "label_name": "CWE-352", "label": 0}
+{"code": " def test_dir(self, tmpdir):\n url = QUrl.fromLocalFile(str(tmpdir))\n req = QNetworkRequest(url)\n reply = filescheme.handler(req)\n # The URL will always use /, even on Windows - so we force this here\n # too.\n tmpdir_path = str(tmpdir).replace(os.sep, '/')\n assert reply.readAll() == filescheme.dirbrowser_html(tmpdir_path)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_noparams(self):\n \"\"\" Test missing all query parameters. \"\"\"\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url)\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_certificates_features_csv(self):\n \"\"\"\n Test for certificate csv features.\n \"\"\"\n url = reverse('get_issued_certificates', kwargs={'course_id': unicode(self.course.id)})\n url += '?csv=true'\n # firstly generating downloadable certificates with 'honor' mode\n certificate_count = 3\n for __ in xrange(certificate_count):\n self.generate_certificate(course_id=self.course.id, mode='honor', status=CertificateStatuses.downloadable)\n\n current_date = datetime.date.today().strftime(\"%B %d, %Y\")\n response = self.client.get(url)\n self.assertEqual(response['Content-Type'], 'text/csv')\n self.assertEqual(response['Content-Disposition'], 'attachment; filename={0}'.format('issued_certificates.csv'))\n self.assertEqual(\n response.content.strip(),\n '\"CourseID\",\"Certificate Type\",\"Total Certificates Issued\",\"Date Report Run\"\\r\\n\"'\n + str(self.course.id) + '\",\"honor\",\"3\",\"' + current_date + '\"'\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_sale_records_features_json(self):\n \"\"\"\n Test that the response from get_sale_records is in json format.\n \"\"\"\n for i in range(5):\n course_registration_code = CourseRegistrationCode(\n code='sale_invoice{}'.format(i),\n course_id=self.course.id.to_deprecated_string(),\n created_by=self.instructor,\n invoice=self.sale_invoice_1,\n invoice_item=self.invoice_item,\n mode_slug='honor'\n )\n course_registration_code.save()\n\n url = reverse('get_sale_records', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n self.assertIn('sale', res_json)\n\n for res in res_json['sale']:\n self.validate_sale_records_response(\n res,\n course_registration_code,\n self.sale_invoice_1,\n 0,\n invoice_item=self.invoice_item\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def wrapped(*args, **kwargs): # pylint: disable=missing-docstring\n request = args[0]\n\n error_response_data = {\n 'error': 'Missing required query parameter(s)',\n 'parameters': [],\n 'info': {},\n }\n\n for (param, extra) in required_params:\n default = object()\n if request.GET.get(param, default) == default:\n error_response_data['parameters'].append(param)\n error_response_data['info'][param] = extra\n\n if len(error_response_data['parameters']) > 0:\n return JsonResponse(error_response_data, status=400)\n else:\n return func(*args, **kwargs)", "label_name": "CWE-352", "label": 0}
+{"code": "def shutdown():\n task = int(request.args.get(\"parameter\").strip())\n showtext = {}\n if task in (0, 1): # valid commandos received\n # close all database connections\n calibre_db.dispose()\n ub.dispose()\n\n if task == 0:\n showtext['text'] = _(u'Server restarted, please reload page')\n else:\n showtext['text'] = _(u'Performing shutdown of server, please close window')\n # stop gevent/tornado server\n web_server.stop(task == 0)\n return json.dumps(showtext)\n\n if task == 2:\n log.warning(\"reconnecting to calibre database\")\n calibre_db.reconnect_db(config, ub.app_DB_path)\n showtext['text'] = _(u'Reconnect successful')\n return json.dumps(showtext)\n\n showtext['text'] = _(u'Unknown command')\n return json.dumps(showtext), 400", "label_name": "CWE-352", "label": 0}
+{"code": "def test_qute_settings_persistence(short_tmpdir, request, quteproc_new):\n \"\"\"Make sure settings from qute://settings are persistent.\"\"\"\n args = _base_args(request.config) + ['--basedir', str(short_tmpdir)]\n quteproc_new.start(args)\n quteproc_new.open_path(\n 'qute://settings/set?option=search.ignore_case&value=always')\n assert quteproc_new.get_setting('search.ignore_case') == 'always'\n\n quteproc_new.send_cmd(':quit')\n quteproc_new.wait_for_quit()\n\n quteproc_new.start(args)\n assert quteproc_new.get_setting('search.ignore_case') == 'always'", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_instructor_tasks_running(self, act):\n \"\"\" Test list of all running tasks. \"\"\"\n act.return_value = self.tasks\n url = reverse('list_instructor_tasks', kwargs={'course_id': self.course.id.to_deprecated_string()})\n mock_factory = MockCompletionInfo()\n with patch('instructor.views.instructor_task_helpers.get_task_completion_info') as mock_completion_info:\n mock_completion_info.side_effect = mock_factory.mock_get_task_completion_info\n response = self.client.get(url, {})\n self.assertEqual(response.status_code, 200)\n\n # check response\n self.assertTrue(act.called)\n expected_tasks = [ftask.to_dict() for ftask in self.tasks]\n actual_tasks = json.loads(response.content)['tasks']\n for exp_task, act_task in zip(expected_tasks, actual_tasks):\n self.assertDictEqual(exp_task, act_task)\n self.assertEqual(actual_tasks, expected_tasks)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_course_role_members_beta(self):\n url = reverse('list_course_role_members', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'rolename': 'beta',\n })\n self.assertEqual(response.status_code, 200)\n\n # check response content\n expected = {\n 'course_id': self.course.id.to_deprecated_string(),\n 'beta': []\n }\n res_json = json.loads(response.content)\n self.assertEqual(res_json, expected)", "label_name": "CWE-352", "label": 0}
+{"code": "def reset_due_date(request, course_id):\n \"\"\"\n Rescinds a due date extension for a student on a particular unit.\n \"\"\"\n course = get_course_by_id(SlashSeparatedCourseKey.from_deprecated_string(course_id))\n student = require_student_from_identifier(request.GET.get('student'))\n unit = find_unit(course, request.GET.get('url'))\n set_due_date_extension(course, unit, student, None)\n if not getattr(unit, \"due\", None):\n # It's possible the normal due date was deleted after an extension was granted:\n return JsonResponse(\n _(\"Successfully removed invalid due date extension (unit has no due date).\")\n )\n\n original_due_date_str = unit.due.strftime('%Y-%m-%d %H:%M')\n return JsonResponse(_(\n 'Successfully reset due date for student {0} for {1} '\n 'to {2}').format(student.profile.name, _display_unit(unit),\n original_due_date_str))", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_entrance_exam_student_attempts_single(self):\n \"\"\" Test reset single student attempts for entrance exam. \"\"\"\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 200)\n # make sure problem attempts have been reset.\n changed_modules = StudentModule.objects.filter(module_state_key__in=self.ee_modules)\n for changed_module in changed_modules:\n self.assertEqual(\n json.loads(changed_module.state)['attempts'],\n 0\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_show_unit_extensions(self):\n self.test_change_due_date()\n url = reverse('show_unit_extensions',\n kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {'url': self.week1.location.to_deprecated_string()})\n self.assertEqual(response.status_code, 200, response.content)\n self.assertEqual(json.loads(response.content), {\n u'data': [{u'Extended Due Date': u'2013-12-30 00:00',\n u'Full Name': self.user1.profile.name,\n u'Username': self.user1.username}],\n u'header': [u'Username', u'Full Name', u'Extended Due Date'],\n u'title': u'Users with due date extensions for %s' %\n self.week1.display_name})", "label_name": "CWE-352", "label": 0}
+{"code": " def test_rescore_entrance_exam_all_student_and_single(self):\n \"\"\" Test re-scoring with both all students and single student parameters. \"\"\"\n url = reverse('rescore_entrance_exam', kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n 'all_students': True,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": "def add_security_headers(resp):\n resp.headers['Content-Security-Policy'] = \"default-src 'self' 'unsafe-inline' 'unsafe-eval';\"\n if request.endpoint == \"editbook.edit_book\":\n resp.headers['Content-Security-Policy'] += \"img-src * data:\"\n resp.headers['X-Content-Type-Options'] = 'nosniff'\n resp.headers['X-Frame-Options'] = 'SAMEORIGIN'\n resp.headers['X-XSS-Protection'] = '1; mode=block'\n resp.headers['Strict-Transport-Security'] = 'max-age=31536000; includeSubDomains'\n # log.debug(request.full_path)\n return resp", "label_name": "CWE-352", "label": 0}
+{"code": " def test_change_nonexistent_due_date(self):\n url = reverse('change_due_date', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'student': self.user1.username,\n 'url': self.week3.location.to_deprecated_string(),\n 'due_datetime': '12/30/2013 00:00'\n })\n self.assertEqual(response.status_code, 400, response.content)\n self.assertEqual(\n None,\n get_extended_due(self.course, self.week3, self.user1)\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_change_due_date(self):\n url = reverse('change_due_date', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'student': self.user1.username,\n 'url': self.week1.location.to_deprecated_string(),\n 'due_datetime': '12/30/2013 00:00'\n })\n self.assertEqual(response.status_code, 200, response.content)\n self.assertEqual(datetime.datetime(2013, 12, 30, 0, 0, tzinfo=utc),\n get_extended_due(self.course, self.week1, self.user1))", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_instructor_tasks_problem(self, act):\n \"\"\" Test list task history for problem. \"\"\"\n act.return_value = self.tasks\n url = reverse('list_instructor_tasks', kwargs={'course_id': self.course.id.to_deprecated_string()})\n mock_factory = MockCompletionInfo()\n with patch('instructor.views.instructor_task_helpers.get_task_completion_info') as mock_completion_info:\n mock_completion_info.side_effect = mock_factory.mock_get_task_completion_info\n response = self.client.get(url, {\n 'problem_location_str': self.problem_urlname,\n })\n self.assertEqual(response.status_code, 200)\n\n # check response\n self.assertTrue(act.called)\n expected_tasks = [ftask.to_dict() for ftask in self.tasks]\n actual_tasks = json.loads(response.content)['tasks']\n for exp_task, act_task in zip(expected_tasks, actual_tasks):\n self.assertDictEqual(exp_task, act_task)\n self.assertEqual(actual_tasks, expected_tasks)", "label_name": "CWE-352", "label": 0}
+{"code": "def get_student_progress_url(request, course_id):\n \"\"\"\n Get the progress url of a student.\n Limited to staff access.\n\n Takes query paremeter unique_student_identifier and if the student exists\n returns e.g. {\n 'progress_url': '/../...'\n }\n \"\"\"\n course_id = SlashSeparatedCourseKey.from_deprecated_string(course_id)\n user = get_student_from_identifier(request.GET.get('unique_student_identifier'))\n\n progress_url = reverse('student_progress', kwargs={'course_id': course_id.to_deprecated_string(), 'student_id': user.id})\n\n response_payload = {\n 'course_id': course_id.to_deprecated_string(),\n 'progress_url': progress_url,\n }\n return JsonResponse(response_payload)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_entrance_exam_all_student_attempts(self, act):\n \"\"\" Test reset all student attempts for entrance exam. \"\"\"\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'all_students': True,\n })\n self.assertEqual(response.status_code, 200)\n self.assertTrue(act.called)", "label_name": "CWE-352", "label": 0}
+{"code": "def list_entrance_exam_instructor_tasks(request, course_id): # pylint: disable=invalid-name\n \"\"\"\n List entrance exam related instructor tasks.\n\n Takes either of the following query parameters\n - unique_student_identifier is an email or username\n - all_students is a boolean\n \"\"\"\n course_id = SlashSeparatedCourseKey.from_deprecated_string(course_id)\n course = get_course_by_id(course_id)\n student = request.GET.get('unique_student_identifier', None)\n if student is not None:\n student = get_student_from_identifier(student)\n\n try:\n entrance_exam_key = course_id.make_usage_key_from_deprecated_string(course.entrance_exam_id)\n except InvalidKeyError:\n return HttpResponseBadRequest(_(\"Course has no valid entrance exam section.\"))\n if student:\n # Specifying for a single student's entrance exam history\n tasks = instructor_task.api.get_entrance_exam_instructor_task_history(course_id, entrance_exam_key, student)\n else:\n # Specifying for all student's entrance exam history\n tasks = instructor_task.api.get_entrance_exam_instructor_task_history(course_id, entrance_exam_key)\n\n response_payload = {\n 'tasks': map(extract_task_features, tasks),\n }\n return JsonResponse(response_payload)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_entrance_exam_delete_state_with_staff(self):\n \"\"\" Test entrance exam delete state failure with staff access. \"\"\"\n self.client.logout()\n staff_user = StaffFactory(course_key=self.course.id)\n self.client.login(username=staff_user.username, password='test')\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n 'delete_module': True,\n })\n self.assertEqual(response.status_code, 403)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_entrance_exam_student_attempts_deletall(self):\n \"\"\" Make sure no one can delete all students state on entrance exam. \"\"\"\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'all_students': True,\n 'delete_module': True,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_revoke_with_username(self):\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.other_staff.username,\n 'rolename': 'staff',\n 'action': 'revoke',\n })\n self.assertEqual(response.status_code, 200)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_student_progress_url_noparams(self):\n \"\"\" Test that the endpoint 404's without the required query params. \"\"\"\n url = reverse('get_student_progress_url', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url)\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_entrance_exam_reset_student_attempts_nonsense(self):\n \"\"\" Test failure with both unique_student_identifier and all_students. \"\"\"\n url = reverse('reset_student_attempts_for_entrance_exam',\n kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'unique_student_identifier': self.student.email,\n 'all_students': True,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_students_features_teams(self, has_teams):\n \"\"\"\n Test that get_students_features includes team info when the course is\n has teams enabled, and does not when the course does not have teams enabled\n \"\"\"\n if has_teams:\n self.course = CourseFactory.create(teams_configuration={\n 'max_size': 2, 'topics': [{'topic-id': 'topic', 'name': 'Topic', 'description': 'A Topic'}]\n })\n course_instructor = InstructorFactory(course_key=self.course.id)\n self.client.login(username=course_instructor.username, password='test')\n\n url = reverse('get_students_features', kwargs={'course_id': unicode(self.course.id)})\n\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n\n self.assertEqual('team' in res_json['feature_names'], has_teams)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_student_progress_url_from_uname(self):\n \"\"\" Test that progress_url is in the successful response. \"\"\"\n url = reverse('get_student_progress_url', kwargs={'course_id': self.course.id.to_deprecated_string()})\n url += \"?unique_student_identifier={}\".format(\n quote(self.students[0].username.encode(\"utf-8\"))\n )\n response = self.client.get(url)\n self.assertEqual(response.status_code, 200)\n res_json = json.loads(response.content)\n self.assertIn('progress_url', res_json)", "label_name": "CWE-352", "label": 0}
+{"code": "def show_unit_extensions(request, course_id):\n \"\"\"\n Shows all of the students which have due date extensions for the given unit.\n \"\"\"\n course = get_course_by_id(SlashSeparatedCourseKey.from_deprecated_string(course_id))\n unit = find_unit(course, request.GET.get('url'))\n return JsonResponse(dump_module_extensions(course, unit))", "label_name": "CWE-352", "label": 0}
+{"code": " def test_rescore_problem_single_from_uname(self, act):\n \"\"\" Test rescoring of a single student. \"\"\"\n url = reverse('rescore_problem', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': self.problem_urlname,\n 'unique_student_identifier': self.student.username,\n })\n self.assertEqual(response.status_code, 200)\n self.assertTrue(act.called)", "label_name": "CWE-352", "label": 0}
+{"code": "def rescore_problem(request, course_id):\n \"\"\"\n Starts a background process a students attempts counter. Optionally deletes student state for a problem.\n Limited to instructor access.\n\n Takes either of the following query paremeters\n - problem_to_reset is a urlname of a problem\n - unique_student_identifier is an email or username\n - all_students is a boolean\n\n all_students and unique_student_identifier cannot both be present.\n \"\"\"\n course_id = SlashSeparatedCourseKey.from_deprecated_string(course_id)\n problem_to_reset = strip_if_string(request.GET.get('problem_to_reset'))\n student_identifier = request.GET.get('unique_student_identifier', None)\n student = None\n if student_identifier is not None:\n student = get_student_from_identifier(student_identifier)\n\n all_students = request.GET.get('all_students') in ['true', 'True', True]\n\n if not (problem_to_reset and (all_students or student)):\n return HttpResponseBadRequest(\"Missing query parameters.\")\n\n if all_students and student:\n return HttpResponseBadRequest(\n \"Cannot rescore with all_students and unique_student_identifier.\"\n )\n\n try:\n module_state_key = course_id.make_usage_key_from_deprecated_string(problem_to_reset)\n except InvalidKeyError:\n return HttpResponseBadRequest(\"Unable to parse problem id\")\n\n response_payload = {}\n response_payload['problem_to_reset'] = problem_to_reset\n\n if student:\n response_payload['student'] = student_identifier\n instructor_task.api.submit_rescore_problem_for_student(request, module_state_key, student)\n response_payload['task'] = 'created'\n elif all_students:\n instructor_task.api.submit_rescore_problem_for_all_students(request, module_state_key)\n response_payload['task'] = 'created'\n else:\n return HttpResponseBadRequest()\n\n return JsonResponse(response_payload)", "label_name": "CWE-352", "label": 0}
+{"code": "def test_post_broken_body():\n response = client.post(\"/items/\", data={\"name\": \"Foo\", \"price\": 50.5})\n assert response.status_code == 422, response.text\n assert response.json() == {\n \"detail\": [\n {\n \"ctx\": {\n \"colno\": 1,\n \"doc\": \"name=Foo&price=50.5\",\n \"lineno\": 1,\n \"msg\": \"Expecting value\",\n \"pos\": 0,\n },\n \"loc\": [\"body\", 0],\n \"msg\": \"Expecting value: line 1 column 1 (char 0)\",\n \"type\": \"value_error.jsondecode\",\n }\n ]\n }\n with patch(\"json.loads\", side_effect=Exception):\n response = client.post(\"/items/\", json={\"test\": \"test2\"})\n assert response.status_code == 400, response.text\n assert response.json() == {\"detail\": \"There was an error parsing the body\"}", "label_name": "CWE-352", "label": 0}
+{"code": " def test_certificates_features_group_by_mode(self):\n \"\"\"\n Test for certificate csv features against mode. Certificates should be group by 'mode' in reponse.\n \"\"\"\n url = reverse('get_issued_certificates', kwargs={'course_id': unicode(self.course.id)})\n # firstly generating downloadable certificates with 'honor' mode\n certificate_count = 3\n for __ in xrange(certificate_count):\n self.generate_certificate(course_id=self.course.id, mode='honor', status=CertificateStatuses.downloadable)\n\n response = self.client.get(url)\n res_json = json.loads(response.content)\n self.assertIn('certificates', res_json)\n self.assertEqual(len(res_json['certificates']), 1)\n\n # retrieve the first certificate from the list, there should be 3 certificates for 'honor' mode.\n certificate = res_json['certificates'][0]\n self.assertEqual(certificate.get('total_issued_certificate'), 3)\n self.assertEqual(certificate.get('mode'), 'honor')\n self.assertEqual(certificate.get('course_id'), str(self.course.id))\n\n # Now generating downloadable certificates with 'verified' mode\n for __ in xrange(certificate_count):\n self.generate_certificate(\n course_id=self.course.id,\n mode='verified',\n status=CertificateStatuses.downloadable\n )\n\n response = self.client.get(url)\n res_json = json.loads(response.content)\n self.assertIn('certificates', res_json)\n\n # total certificate count should be 2 for 'verified' mode.\n self.assertEqual(len(res_json['certificates']), 2)\n\n # retrieve the second certificate from the list\n certificate = res_json['certificates'][1]\n self.assertEqual(certificate.get('total_issued_certificate'), 3)\n self.assertEqual(certificate.get('mode'), 'verified')", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_email_with_no_successes(self, task_history_request):\n task_info = FakeContentTask(0, 0, 10, 'expected')\n email = FakeEmail(0)\n email_info = FakeEmailInfo(email, 0, 10)\n task_history_request.return_value = [task_info]\n url = reverse('list_email_content', kwargs={'course_id': self.course.id.to_deprecated_string()})\n with patch('instructor.views.api.CourseEmail.objects.get') as mock_email_info:\n mock_email_info.return_value = email\n response = self.client.get(url, {})\n self.assertEqual(response.status_code, 200)\n\n self.assertTrue(task_history_request.called)\n returned_info_list = json.loads(response.content)['emails']\n\n self.assertEqual(len(returned_info_list), 1)\n returned_info = returned_info_list[0]\n expected_info = email_info.to_dict()\n self.assertDictEqual(expected_info, returned_info)", "label_name": "CWE-352", "label": 0}
+{"code": "def get_problem_responses(request, course_id):\n \"\"\"\n Initiate generation of a CSV file containing all student answers\n to a given problem.\n\n Responds with JSON\n {\"status\": \"... status message ...\"}\n\n if initiation is successful (or generation task is already running).\n\n Responds with BadRequest if problem location is faulty.\n \"\"\"\n course_key = CourseKey.from_string(course_id)\n problem_location = request.GET.get('problem_location', '')\n\n try:\n problem_key = UsageKey.from_string(problem_location)\n # Are we dealing with an \"old-style\" problem location?\n run = problem_key.run\n if not run:\n problem_key = course_key.make_usage_key_from_deprecated_string(problem_location)\n if problem_key.course_key != course_key:\n raise InvalidKeyError(type(problem_key), problem_key)\n except InvalidKeyError:\n return JsonResponseBadRequest(_(\"Could not find problem with this location.\"))\n\n try:\n instructor_task.api.submit_calculate_problem_responses_csv(request, course_key, problem_location)\n success_status = _(\n \"The problem responses report is being created.\"\n \" To view the status of the report, see Pending Tasks below.\"\n )\n return JsonResponse({\"status\": success_status})\n except AlreadyRunningError:\n already_running_status = _(\n \"A problem responses report generation task is already in progress. \"\n \"Check the 'Pending Tasks' table for the status of the task. \"\n \"When completed, the report will be available for download in the table below.\"\n )\n return JsonResponse({\"status\": already_running_status})", "label_name": "CWE-352", "label": 0}
+{"code": "def change_due_date(request, course_id):\n \"\"\"\n Grants a due date extension to a student for a particular unit.\n \"\"\"\n course = get_course_by_id(SlashSeparatedCourseKey.from_deprecated_string(course_id))\n student = require_student_from_identifier(request.GET.get('student'))\n unit = find_unit(course, request.GET.get('url'))\n due_date = parse_datetime(request.GET.get('due_datetime'))\n set_due_date_extension(course, unit, student, due_date)\n\n return JsonResponse(_(\n 'Successfully changed due date for student {0} for {1} '\n 'to {2}').format(student.profile.name, _display_unit(unit),\n due_date.strftime('%Y-%m-%d %H:%M')))", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_allow(self):\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.other_user.email,\n 'rolename': 'staff',\n 'action': 'allow',\n })\n self.assertEqual(response.status_code, 200)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_background_email_tasks(self, act):\n \"\"\"Test list of background email tasks.\"\"\"\n act.return_value = self.tasks\n url = reverse('list_background_email_tasks', kwargs={'course_id': self.course.id.to_deprecated_string()})\n mock_factory = MockCompletionInfo()\n with patch('instructor.views.instructor_task_helpers.get_task_completion_info') as mock_completion_info:\n mock_completion_info.side_effect = mock_factory.mock_get_task_completion_info\n response = self.client.get(url, {})\n self.assertEqual(response.status_code, 200)\n\n # check response\n self.assertTrue(act.called)\n expected_tasks = [ftask.to_dict() for ftask in self.tasks]\n actual_tasks = json.loads(response.content)['tasks']\n for exp_task, act_task in zip(expected_tasks, actual_tasks):\n self.assertDictEqual(exp_task, act_task)\n self.assertEqual(actual_tasks, expected_tasks)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_problem_responses_successful(self):\n \"\"\"\n Test whether get_problem_responses returns an appropriate status\n message if CSV generation was started successfully.\n \"\"\"\n url = reverse(\n 'get_problem_responses',\n kwargs={'course_id': unicode(self.course.id)}\n )\n problem_location = ''\n\n response = self.client.get(url, {'problem_location': problem_location})\n res_json = json.loads(response.content)\n self.assertIn('status', res_json)\n status = res_json['status']\n self.assertIn('is being created', status)\n self.assertNotIn('already in progress', status)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_modify_access_bad_role(self):\n \"\"\" Test with an invalid action parameter. \"\"\"\n url = reverse('modify_access', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'unique_student_identifier': self.other_staff.email,\n 'rolename': 'robot-not-a-roll',\n 'action': 'revoke',\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def call_add_users_to_cohorts(self, csv_data, suffix='.csv', method='POST'):\n \"\"\"\n Call `add_users_to_cohorts` with a file generated from `csv_data`.\n \"\"\"\n # this temporary file will be removed in `self.tearDown()`\n __, file_name = tempfile.mkstemp(suffix=suffix, dir=self.tempdir)\n with open(file_name, 'w') as file_pointer:\n file_pointer.write(csv_data.encode('utf-8'))\n with open(file_name, 'r') as file_pointer:\n url = reverse('add_users_to_cohorts', kwargs={'course_id': unicode(self.course.id)})\n if method == 'POST':\n return self.client.post(url, {'uploaded-file': file_pointer})\n elif method == 'GET':\n return self.client.get(url, {'uploaded-file': file_pointer})", "label_name": "CWE-352", "label": 0}
+{"code": "def show_student_extensions(request, course_id):\n \"\"\"\n Shows all of the due date extensions granted to a particular student in a\n particular course.\n \"\"\"\n student = require_student_from_identifier(request.GET.get('student'))\n course = get_course_by_id(SlashSeparatedCourseKey.from_deprecated_string(course_id))\n return JsonResponse(dump_student_extensions(course, student))", "label_name": "CWE-352", "label": 0}
+{"code": " def test_create_registration_code_without_invoice_and_order(self):\n \"\"\"\n test generate detailed enrollment report,\n used a registration codes which has been created via invoice or bulk\n purchase scenario.\n \"\"\"\n course_registration_code = CourseRegistrationCode.objects.create(\n code='abcde',\n course_id=self.course.id.to_deprecated_string(),\n created_by=self.instructor,\n mode_slug='honor'\n )\n test_user1 = UserFactory()\n self.register_with_redemption_code(test_user1, course_registration_code.code)\n\n CourseFinanceAdminRole(self.course.id).add_users(self.instructor)\n self.client.login(username=self.instructor.username, password='test')\n\n url = reverse('get_enrollment_report', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {})\n self.assertIn('The detailed enrollment report is being created.', response.content)", "label_name": "CWE-352", "label": 0}
+{"code": "def rescore_entrance_exam(request, course_id):\n \"\"\"\n Starts a background process a students attempts counter for entrance exam.\n Optionally deletes student state for a problem. Limited to instructor access.\n\n Takes either of the following query parameters\n - unique_student_identifier is an email or username\n - all_students is a boolean\n\n all_students and unique_student_identifier cannot both be present.\n \"\"\"\n course_id = SlashSeparatedCourseKey.from_deprecated_string(course_id)\n course = get_course_with_access(\n request.user, 'staff', course_id, depth=None\n )\n\n student_identifier = request.GET.get('unique_student_identifier', None)\n student = None\n if student_identifier is not None:\n student = get_student_from_identifier(student_identifier)\n\n all_students = request.GET.get('all_students') in ['true', 'True', True]\n\n if not course.entrance_exam_id:\n return HttpResponseBadRequest(\n _(\"Course has no entrance exam section.\")\n )\n\n if all_students and student:\n return HttpResponseBadRequest(\n _(\"Cannot rescore with all_students and unique_student_identifier.\")\n )\n\n try:\n entrance_exam_key = course_id.make_usage_key_from_deprecated_string(course.entrance_exam_id)\n except InvalidKeyError:\n return HttpResponseBadRequest(_(\"Course has no valid entrance exam section.\"))\n\n response_payload = {}\n if student:\n response_payload['student'] = student_identifier\n else:\n response_payload['student'] = _(\"All Students\")\n instructor_task.api.submit_rescore_entrance_exam_for_student(request, entrance_exam_key, student)\n response_payload['task'] = 'created'\n return JsonResponse(response_payload)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_unicode_encode_error(self, mocker):\n url = QUrl('file:///tmp/foo')\n req = QNetworkRequest(url)\n\n err = UnicodeEncodeError('ascii', '', 0, 2, 'foo')\n mocker.patch('os.path.isdir', side_effect=err)\n\n reply = filescheme.handler(req)\n assert reply is None", "label_name": "CWE-352", "label": 0}
+{"code": " def _access_endpoint(self, endpoint, args, status_code, msg):\n \"\"\"\n Asserts that accessing the given `endpoint` gets a response of `status_code`.\n\n endpoint: string, endpoint for instructor dash API\n args: dict, kwargs for `reverse` call\n status_code: expected HTTP status code response\n msg: message to display if assertion fails.\n \"\"\"\n url = reverse(endpoint, kwargs={'course_id': self.course.id.to_deprecated_string()})\n if endpoint in ['send_email', 'students_update_enrollment', 'bulk_beta_modify_access']:\n response = self.client.post(url, args)\n else:\n response = self.client.get(url, args)\n self.assertEqual(\n response.status_code,\n status_code,\n msg=msg\n )", "label_name": "CWE-352", "label": 0}
+{"code": " def test_list_course_role_members_bad_rolename(self):\n \"\"\" Test with an invalid rolename parameter. \"\"\"\n url = reverse('list_course_role_members', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'rolename': 'robot-not-a-rolename',\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_rescore_problem_single(self, act):\n \"\"\" Test rescoring of a single student. \"\"\"\n url = reverse('rescore_problem', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': self.problem_urlname,\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 200)\n self.assertTrue(act.called)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_coupon_redeem_count_in_ecommerce_section(self):\n \"\"\"\n Test that checks the redeem count in the instructor_dashboard coupon section\n \"\"\"\n # add the coupon code for the course\n coupon = Coupon(\n code='test_code', description='test_description', course_id=self.course.id,\n percentage_discount='10', created_by=self.instructor, is_active=True\n )\n coupon.save()\n\n # Coupon Redeem Count only visible for Financial Admins.\n CourseFinanceAdminRole(self.course.id).add_users(self.instructor)\n\n PaidCourseRegistration.add_to_order(self.cart, self.course.id)\n # apply the coupon code to the item in the cart\n resp = self.client.post(reverse('shoppingcart.views.use_code'), {'code': coupon.code})\n self.assertEqual(resp.status_code, 200)\n\n # URL for instructor dashboard\n instructor_dashboard = reverse('instructor_dashboard', kwargs={'course_id': self.course.id.to_deprecated_string()})\n # visit the instructor dashboard page and\n # check that the coupon redeem count should be 0\n resp = self.client.get(instructor_dashboard)\n self.assertEqual(resp.status_code, 200)\n self.assertIn('Number Redeemed', resp.content)\n self.assertIn('
0
', resp.content)\n\n # now make the payment of your cart items\n self.cart.purchase()\n # visit the instructor dashboard page and\n # check that the coupon redeem count should be 1\n resp = self.client.get(instructor_dashboard)\n self.assertEqual(resp.status_code, 200)\n\n self.assertIn('Number Redeemed', resp.content)\n self.assertIn('
1
', resp.content)", "label_name": "CWE-352", "label": 0}
+{"code": "def require_query_params(*args, **kwargs):\n \"\"\"\n Checks for required paremters or renders a 400 error.\n (decorator with arguments)\n\n `args` is a *list of required GET parameter names.\n `kwargs` is a **dict of required GET parameter names\n to string explanations of the parameter\n \"\"\"\n required_params = []\n required_params += [(arg, None) for arg in args]\n required_params += [(key, kwargs[key]) for key in kwargs]\n # required_params = e.g. [('action', 'enroll or unenroll'), ['emails', None]]\n\n def decorator(func): # pylint: disable=missing-docstring\n def wrapped(*args, **kwargs): # pylint: disable=missing-docstring\n request = args[0]\n\n error_response_data = {\n 'error': 'Missing required query parameter(s)',\n 'parameters': [],\n 'info': {},\n }\n\n for (param, extra) in required_params:\n default = object()\n if request.GET.get(param, default) == default:\n error_response_data['parameters'].append(param)\n error_response_data['info'][param] = extra\n\n if len(error_response_data['parameters']) > 0:\n return JsonResponse(error_response_data, status=400)\n else:\n return func(*args, **kwargs)\n return wrapped\n return decorator", "label_name": "CWE-352", "label": 0}
+{"code": " def test_rescore_entrance_exam_all_student(self):\n \"\"\" Test rescoring for all students. \"\"\"\n url = reverse('rescore_entrance_exam', kwargs={'course_id': unicode(self.course.id)})\n response = self.client.get(url, {\n 'all_students': True,\n })\n self.assertEqual(response.status_code, 200)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_student_attempts_all(self, act):\n \"\"\" Test reset all student attempts. \"\"\"\n url = reverse('reset_student_attempts', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': self.problem_urlname,\n 'all_students': True,\n })\n self.assertEqual(response.status_code, 200)\n self.assertTrue(act.called)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_students_features(self):\n \"\"\"\n Test that some minimum of information is formatted\n correctly in the response to get_students_features.\n \"\"\"\n for student in self.students:\n student.profile.city = \"Mos Eisley {}\".format(student.id)\n student.profile.save()\n url = reverse('get_students_features', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n self.assertIn('students', res_json)\n for student in self.students:\n student_json = [\n x for x in res_json['students']\n if x['username'] == student.username\n ][0]\n self.assertEqual(student_json['username'], student.username)\n self.assertEqual(student_json['email'], student.email)\n self.assertEqual(student_json['city'], student.profile.city)\n self.assertEqual(student_json['country'], \"\")", "label_name": "CWE-352", "label": 0}
+{"code": "def handler(request):\n \"\"\"Handler for a file:// URL.\n\n Args:\n request: QNetworkRequest to answer to.\n\n Return:\n A QNetworkReply for directories, None for files.\n \"\"\"\n path = request.url().toLocalFile()\n try:\n if os.path.isdir(path):\n data = dirbrowser_html(path)\n return networkreply.FixedDataNetworkReply(\n request, data, 'text/html')\n return None\n except UnicodeEncodeError:\n return None", "label_name": "CWE-352", "label": 0}
+{"code": " def __init__(self):\r\n field_infos = [\r\n FieldInfo.factory(key)\r\n for key in list(request.form.keys()) + list(request.files.keys())\r\n ]\r\n # important to sort them so they will be in expected order on command line\r\n self.field_infos = list(sorted(field_infos))\r", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_problem_responses_already_running(self):\n \"\"\"\n Test whether get_problem_responses returns an appropriate status\n message if CSV generation is already in progress.\n \"\"\"\n url = reverse(\n 'get_problem_responses',\n kwargs={'course_id': unicode(self.course.id)}\n )\n\n with patch('instructor_task.api.submit_calculate_problem_responses_csv') as submit_task_function:\n error = AlreadyRunningError()\n submit_task_function.side_effect = error\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n self.assertIn('status', res_json)\n self.assertIn('already in progress', res_json['status'])", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_student_attempts_nonsense(self):\n \"\"\" Test failure with both unique_student_identifier and all_students. \"\"\"\n url = reverse('reset_student_attempts', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': self.problem_urlname,\n 'unique_student_identifier': self.student.email,\n 'all_students': True,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_reset_student_attempts_missingmodule(self):\n \"\"\" Test reset for non-existant problem. \"\"\"\n url = reverse('reset_student_attempts', kwargs={'course_id': self.course.id.to_deprecated_string()})\n response = self.client.get(url, {\n 'problem_to_reset': 'robot-not-a-real-module',\n 'unique_student_identifier': self.student.email,\n })\n self.assertEqual(response.status_code, 400)", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_student_exam_results(self):\n \"\"\"\n Test whether get_proctored_exam_results returns an appropriate\n status message when users request a CSV file.\n \"\"\"\n url = reverse(\n 'get_proctored_exam_results',\n kwargs={'course_id': unicode(self.course.id)}\n )\n # Successful case:\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n self.assertIn('status', res_json)\n self.assertNotIn('currently being created', res_json['status'])\n # CSV generation already in progress:\n with patch('instructor_task.api.submit_proctored_exam_results_report') as submit_task_function:\n error = AlreadyRunningError()\n submit_task_function.side_effect = error\n response = self.client.get(url, {})\n res_json = json.loads(response.content)\n self.assertIn('status', res_json)\n self.assertIn('currently being created', res_json['status'])", "label_name": "CWE-352", "label": 0}
+{"code": " def test_get_problem_responses_invalid_location(self):\n \"\"\"\n Test whether get_problem_responses returns an appropriate status\n message when users submit an invalid problem location.\n \"\"\"\n url = reverse(\n 'get_problem_responses',\n kwargs={'course_id': unicode(self.course.id)}\n )\n problem_location = ''\n\n response = self.client.get(url, {'problem_location': problem_location})\n res_json = json.loads(response.content)\n self.assertEqual(res_json, 'Could not find problem with this location.')", "label_name": "CWE-352", "label": 0}
+{"code": " protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {\n\n resp.setContentType(\"application/json\");\n final PrintWriter out = resp.getWriter();\n\n HttpSession session = req.getSession(false);\n\n if (session != null) {\n Subject subject = (Subject) session.getAttribute(\"subject\");\n if (subject == null) {\n LOG.warn(\"No security subject stored in existing session, invalidating\");\n session.invalidate();\n Helpers.doForbidden(resp);\n }\n returnPrincipals(subject, out);\n return;\n }\n\n AccessControlContext acc = AccessController.getContext();\n Subject subject = Subject.getSubject(acc);\n\n if (subject == null) {\n Helpers.doForbidden(resp);\n return;\n }\n Set principals = subject.getPrincipals();\n\n String username = null;\n\n if (principals != null) {\n for (Principal principal : principals) {\n if (principal.getClass().getSimpleName().equals(\"UserPrincipal\")) {\n username = principal.getName();\n LOG.debug(\"Authorizing user {}\", username);\n }\n }\n }\n\n session = req.getSession(true);\n session.setAttribute(\"subject\", subject);\n session.setAttribute(\"user\", username);\n session.setAttribute(\"org.osgi.service.http.authentication.remote.user\", username);\n session.setAttribute(\"org.osgi.service.http.authentication.type\", HttpServletRequest.BASIC_AUTH);\n session.setAttribute(\"loginTime\", GregorianCalendar.getInstance().getTimeInMillis());\n if (timeout != null) {\n session.setMaxInactiveInterval(timeout);\n }\n if (LOG.isDebugEnabled()) {\n LOG.debug(\"Http session timeout for user {} is {} sec.\", username, session.getMaxInactiveInterval());\n }\n\n returnPrincipals(subject, out);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void initWithCustomLogHandler() throws Exception {\n servlet = new AgentServlet();\n config = createMock(ServletConfig.class);\n context = createMock(ServletContext.class);\n\n HttpTestUtil.prepareServletConfigMock(config, new String[]{ConfigKey.LOGHANDLER_CLASS.getKeyValue(), CustomLogHandler.class.getName()});\n HttpTestUtil.prepareServletContextMock(context,null);\n\n expect(config.getServletContext()).andReturn(context).anyTimes();\n expect(config.getServletName()).andReturn(\"jolokia\").anyTimes();\n replay(config, context);\n\n servlet.init(config);\n servlet.destroy();\n\n assertTrue(CustomLogHandler.infoCount > 0);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void accessDenied() {\n expect(backend.isRemoteAccessAllowed(\"localhost\",\"127.0.0.1\")).andReturn(false);\n replay(backend);\n\n handler.checkClientIPAccess(\"localhost\",\"127.0.0.1\");\n }", "label_name": "CWE-352", "label": 0}
+{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void preflightCheck() {\n String origin = \"http://bla.com\";\n String headers =\"X-Data: Test\";\n expect(backend.isCorsAccessAllowed(origin)).andReturn(true);\n replay(backend);\n\n Map ret = handler.handleCorsPreflightRequest(origin, headers);\n assertEquals(ret.get(\"Access-Control-Allow-Origin\"),origin);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {\n\n HttpSession session = request.getSession(false);\n if (session == null) {\n AccessControlContext acc = AccessController.getContext();\n Subject subject = Subject.getSubject(acc);\n if (subject == null) {\n Helpers.doForbidden(response);\n return;\n }\n session = request.getSession(true);\n session.setAttribute(\"subject\", subject);\n } else {\n Subject subject = (Subject) session.getAttribute(\"subject\");\n if (subject == null) {\n session.invalidate();\n Helpers.doForbidden(response);\n return;\n }\n }\n\n String encoding = request.getHeader(\"Accept-Encoding\");\n boolean supportsGzip = (encoding != null && encoding.toLowerCase().indexOf(\"gzip\") > -1);\n SessionTerminal st = (SessionTerminal) session.getAttribute(\"terminal\");\n if (st == null || st.isClosed()) {\n st = new SessionTerminal(getCommandProcessor(), getThreadIO());\n session.setAttribute(\"terminal\", st);\n }\n String str = request.getParameter(\"k\");\n String f = request.getParameter(\"f\");\n String dump = st.handle(str, f != null && f.length() > 0);\n if (dump != null) {\n if (supportsGzip) {\n response.setHeader(\"Content-Encoding\", \"gzip\");\n response.setHeader(\"Content-Type\", \"text/html\");\n try {\n GZIPOutputStream gzos = new GZIPOutputStream(response.getOutputStream());\n gzos.write(dump.getBytes());\n gzos.close();\n } catch (IOException ie) {\n LOG.info(\"Exception writing response: \", ie);\n }\n } else {\n response.getOutputStream().write(dump.getBytes());\n }\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void withRestrictor() throws InvalidSyntaxException, MalformedObjectNameException {\n setupRestrictor(new InnerRestrictor(true,false,true,false,true,false,true));\n assertTrue(restrictor.isHttpMethodAllowed(HttpMethod.GET));\n assertFalse(restrictor.isTypeAllowed(RequestType.EXEC));\n assertTrue(restrictor.isAttributeReadAllowed(new ObjectName(\"java.lang:type=Memory\"), \"HeapMemoryUsage\"));\n assertFalse(restrictor.isAttributeWriteAllowed(new ObjectName(\"java.lang:type=Memory\"), \"HeapMemoryUsage\"));\n assertTrue(restrictor.isOperationAllowed(new ObjectName(\"java.lang:type=Memory\"), \"gc\"));\n assertFalse(restrictor.isRemoteAccessAllowed(\"localhost\", \"127.0.0.1\"));\n assertTrue(restrictor.isCorsAccessAllowed(\"http://bla.com\"));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public boolean isCorsAccessAllowed(String pOrigin) {\n return restrictor.isCorsAccessAllowed(pOrigin);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public boolean isCorsAccessAllowed(String pOrigin) {\n return isAllowed;\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void preflightCheckNegative() {\n String origin = \"http://bla.com\";\n String headers =\"X-Data: Test\";\n expect(backend.isCorsAccessAllowed(origin)).andReturn(false);\n replay(backend);\n\n Map ret = handler.handleCorsPreflightRequest(origin, headers);\n assertNull(ret.get(\"Access-Control-Allow-Origin\"));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void initWithAgentDiscoveryAndUrlCreationAfterGet() throws ServletException, IOException {\n checkMulticastAvailable();\n prepareStandardInitialisation(ConfigKey.DISCOVERY_ENABLED.getKeyValue(), \"true\");\n try {\n StringWriter sw = initRequestResponseMocks();\n expect(request.getPathInfo()).andReturn(HttpTestUtil.HEAP_MEMORY_GET_REQUEST);\n expect(request.getParameter(ConfigKey.MIME_TYPE.getKeyValue())).andReturn(\"text/plain\");\n String url = \"http://pirx:9876/jolokia\";\n StringBuffer buf = new StringBuffer();\n buf.append(url).append(HttpTestUtil.HEAP_MEMORY_GET_REQUEST);\n expect(request.getRequestURL()).andReturn(buf);\n expect(request.getRequestURI()).andReturn(buf.toString());\n expect(request.getContextPath()).andReturn(\"/jolokia\");\n expect(request.getAuthType()).andReturn(\"BASIC\");\n replay(request, response);\n\n servlet.doGet(request, response);\n\n assertTrue(sw.toString().contains(\"used\"));\n\n JolokiaDiscovery discovery = new JolokiaDiscovery(\"test\",LogHandler.QUIET);\n List in = discovery.lookupAgents();\n assertTrue(in.size() > 0);\n for (JSONObject json : in) {\n if (json.get(\"url\") != null && json.get(\"url\").equals(url)) {\n assertTrue((Boolean) json.get(\"secured\"));\n return;\n }\n }\n fail(\"Failed, because no message had an URL\");\n } finally {\n servlet.destroy();\n }\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public RechnungCostEditTablePanel(final String id)\n {\n super(id);\n feedbackPanel = new FeedbackPanel(\"feedback\");\n ajaxComponents.register(feedbackPanel);\n add(feedbackPanel);\n this.form = new Form(\"form\");\n add(form);\n rows = new RepeatingView(\"rows\");\n form.add(rows);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void corsEmpty() {\n InputStream is = getClass().getResourceAsStream(\"/allow-origin3.xml\");\n PolicyRestrictor restrictor = new PolicyRestrictor(is);\n\n assertTrue(restrictor.isCorsAccessAllowed(\"http://bla.com\"));\n assertTrue(restrictor.isCorsAccessAllowed(\"http://www.jolokia.org\"));\n assertTrue(restrictor.isCorsAccessAllowed(\"http://www.consol.de\"));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void setupRoutes() {\n path(controllerBasePath(), () -> {\n before(\"\", mimeType, this::setContentType);\n\n\n // change the line below to enable appropriate security\n before(\"\", mimeType, this.apiAuthenticationHelper::checkAdminUserAnd403);\n\n get(\"\", mimeType, this::show);\n\n post(\"\", mimeType, this::createOrUpdate);\n put(\"\", mimeType, this::createOrUpdate);\n\n delete(\"\", mimeType, this::deleteBackupConfig);\n });\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void debug() throws IOException, ServletException {\n servlet = new AgentServlet();\n initConfigMocks(new String[]{ConfigKey.DEBUG.getKeyValue(), \"true\"},null,\"No access restrictor found\",null);\n context.log(find(\"URI:\"));\n context.log(find(\"Path-Info:\"));\n context.log(find(\"Request:\"));\n context.log(find(\"time:\"));\n context.log(find(\"Response:\"));\n context.log(find(\"TestDetector\"),isA(RuntimeException.class));\n expectLastCall().anyTimes();\n replay(config, context);\n servlet.init(config);\n\n StringWriter sw = initRequestResponseMocks();\n expect(request.getPathInfo()).andReturn(HttpTestUtil.HEAP_MEMORY_GET_REQUEST);\n expect(request.getParameter(ConfigKey.MIME_TYPE.getKeyValue())).andReturn(null);\n replay(request, response);\n\n servlet.doGet(request, response);\n\n assertTrue(sw.toString().contains(\"used\"));\n servlet.destroy();\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public void corsWildCard() {\n InputStream is = getClass().getResourceAsStream(\"/allow-origin2.xml\");\n PolicyRestrictor restrictor = new PolicyRestrictor(is);\n\n assertTrue(restrictor.isCorsAccessAllowed(\"http://bla.com\"));\n assertTrue(restrictor.isCorsAccessAllowed(\"http://www.jolokia.org\"));\n assertTrue(restrictor.isCorsAccessAllowed(\"http://www.consol.de\"));\n }", "label_name": "CWE-352", "label": 0}
+{"code": " public boolean isCorsAccessAllowed(String pOrigin) {\n return corsChecker.check(pOrigin);\n }", "label_name": "CWE-352", "label": 0}
+{"code": " private Runnable getStandardRequestSetup() {\n return new Runnable() {\n public void run() {\n expect(request.getHeader(\"Origin\")).andReturn(null);\n expect(request.getRemoteHost()).andReturn(\"localhost\");\n expect(request.getRemoteAddr()).andReturn(\"127.0.0.1\");\n expect(request.getRequestURI()).andReturn(\"/jolokia/\");\n expect(request.getParameterMap()).andReturn(null);\n }\n };\n }", "label_name": "CWE-352", "label": 0}
+{"code": " private void returnPrincipals(Subject subject, PrintWriter out) {\n\n Map answer = new HashMap();\n\n List