[ 
https://issues.apache.org/jira/browse/TAP5-1988?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Howard M. Lewis Ship updated TAP5-1988:
---------------------------------------

    Attachment: MATTA-2012-004.txt
    
> Tapestry Security Violations
> ----------------------------
>
>                 Key: TAP5-1988
>                 URL: https://issues.apache.org/jira/browse/TAP5-1988
>             Project: Tapestry 5
>          Issue Type: Bug
>          Components: tapestry-core
>    Affects Versions: 5.3, 5.4
>            Reporter: Howard M. Lewis Ship
>              Labels: security
>         Attachments: MATTA-2012-004.txt
>
>
> An unsolicited security review arrived from Matta concerning Tapestry; both 
> core code, and the GSoC project that provides anti-CSRF (cross-site forgery 
> protection).
> Although I am dubious about the "gzip bombs" allegation, it can be addressed. 
>  In theory, because the contents are an object stream, the objects could be 
> replaced. In practice, all objects need to implement a Tapestry-specific 
> interface (ComponentAction) which means that arbitrary objects can not be 
> injected; only objects that are already present on the classpath of the 
> running application AND implement the ComponentAction interface could be 
> injected.  An attacker would already have "the keys to the kingdom" before 
> they could do damage .. that is, if they can manipulate the classpath of the 
> running application, they already have the ability to deploy any code, or 
> access internal servers directly.
> However, I would see this as an opportunity to remove the t:state:client 
> ("client" PersistentFieldStrategy implementation).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to