> From: Nathaniel Alfred [mailto:[EMAIL PROTECTED]]
>
> But bypassing access controll?
>
> Do you fancy a upload page nicely protected by SunRise and
> still everybody can inject fake files by a request I could
> almost type on the keyboard:
>
> POST /index.html HTTP/1.1
> Content-type: multipart/form-data
> ...
>
> From my experience, Open Source products are called bad names in the
> corporate world already for far more theoretical holes.
I am aware of that - I have contributed with some names myself, and
here's another one:
The request processing in Cocoon in a bag of shit.
I intend to patch it into a non-bag-of-shit-state. I share your
concern for the holes that exist - and the solution is to provide
a finer level of granularity for the request factories (currently it
is classloader scoped - anyone running Cocoon as a shared library take
note). Whether that level is pipeline or webapp remains to be seen,
but my first priority is to rework the infrastructure into a shape
where such changes can be made at all.
As I said, the request factory is currently classloader-scoped.
Once that is gone, we have the theoretical possibility of having
more than one request factory in the whole system, and *then* we can
look into all sorts of security measurements.
/LS
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, email: [EMAIL PROTECTED]