From 9426c94d7bddeff10c8058471b0cfaef6e4fb60f Mon Sep 17 00:00:00 2001
From: Roland Becker <roland@atrol.de>
Date: Fri, 13 Jul 2018 15:18:46 +0200
Subject: [PATCH] Fix XSS vulnerability on filter edit page

Fixes #24608
---
 manage_filter_edit_page.php | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/manage_filter_edit_page.php b/manage_filter_edit_page.php
index 074ca14bd..9478d059c 100644
--- a/manage_filter_edit_page.php
+++ b/manage_filter_edit_page.php
@@ -124,7 +124,7 @@ $t_filter_project_id = filter_get_field( $f_filter_id, 'project_id' );
 						<div class="form-inline">
 							<label>
 								<?php echo lang_get( 'query_name' ) ?>&nbsp;
-								<input type="text" size="25" name="filter_name" maxlength="64" value="<?php echo filter_get_field( $f_filter_id, 'name' ) ?>">
+								<input type="text" size="25" name="filter_name" maxlength="64" value="<?php echo string_display_line( filter_get_field( $f_filter_id, 'name' ) ) ?>">
 							</label>
 						</div>
 					</div>
-- 
2.18.0

