From 711c59a6e04ed8c0afe92ad49ce8acd9b99df265 Mon Sep 17 00:00:00 2001 From: Michael Jerris Date: Wed, 14 Feb 2007 03:32:13 +0000 Subject: [PATCH] potential format string exploit git-svn-id: http://svn.freeswitch.org/svn/freeswitch/trunk@4253 d0543943-73ff-0310-b7d9-9358b9ac24b2 --- src/mod/languages/mod_spidermonkey/mod_spidermonkey.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/mod/languages/mod_spidermonkey/mod_spidermonkey.c b/src/mod/languages/mod_spidermonkey/mod_spidermonkey.c index 586a4c2a6e..c8e63c332f 100644 --- a/src/mod/languages/mod_spidermonkey/mod_spidermonkey.c +++ b/src/mod/languages/mod_spidermonkey/mod_spidermonkey.c @@ -225,7 +225,7 @@ static JSBool event_add_body(JSContext *cx, JSObject *obj, uintN argc, jsval *ar if (argc > 0) { char *body = JS_GetStringBytes(JS_ValueToString(cx, argv[0])); - switch_event_add_body(eo->event, body); + switch_event_add_body(eo->event, "%s", body); *rval = BOOLEAN_TO_JSVAL( JS_TRUE ); return JS_TRUE; }