On Thu, 05 Feb 2004 11:03:36 -0500, "Thomas DeWeese"
<[EMAIL PROTECTED]> said:
> 
> ... however my
> understanding is that script security is implemented using the Java
> 2 Security model in particular it puts _all_ the rhino classes in the
> sand box[*].  I'm sure that a second set of eyes looking at this to
> make sure we are doing it correctly would be greatly appreciated.

This can not be true as far as I can see. From Rhino usage in
RhinoInterpreter it follows that Batik uses the default compilation mode
in Rhino that compiles JavaScript to JVM bytecode, loads the generated
classes and then let JVM execute them. It means that Rhino classes can at
least create ClassLoader instances. 

Now due to bugs in class loader implementations in many released JVMs
(Sun JVMs <= 1.4.1 that I checked has this bug) it also means that Rhino
code can potentially gain AllPermissions. This is in turn means that pure
JavaScript script can gain AllPermissions due to problematic
implementation of SecurityController.

> 
> [*] This does have some unfortunate side effects like the debugger
> can only be used when 'secure scripting' is off - not usually a
> problem since most people debug there own code - but still annoying.

What exactly the problem with it?

Regards, Igor

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to