[ 
https://issues.apache.org/jira/browse/DERBY-2436?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12510507
 ] 

Daniel John Debrunner commented on DERBY-2436:
----------------------------------------------

One also has to consider files/databases from other Derby systems.

E.g. derby.properties/derby.log should not be readable/writeable through the 
import/export routines regardless of if its in ${derby.system.home} or 
${user.dir}



> SYSCS_IMPORT_TABLE can be used to read derby files
> --------------------------------------------------
>
>                 Key: DERBY-2436
>                 URL: https://issues.apache.org/jira/browse/DERBY-2436
>             Project: Derby
>          Issue Type: Bug
>          Components: Security
>    Affects Versions: 10.1.2.1, 10.2.1.6, 10.3.1.0
>            Reporter: Daniel John Debrunner
>            Priority: Critical
>
> There are no controls over which files SYSCS_IMPORT_TABLE can read, thus 
> allowing any user that has permission to execute the procedure to try and 
> access information that they have no permissions to do so. E.g. even with the 
> secure-by-default network server I can execute three lines of SQL to view to 
> contents of derby.properties, thus seeing passwords of other users, or the 
> address of the ldap server.
> create table t (c varchar(32000));
> CALL SYSCS_UTIL.SYSCS_IMPORT_TABLE(NULL, 'T', 'derby.properties', NULL, NULL, 
> 'ISO8859_1', 0);
> ij> select * from T;
> C
> ----------------------------------------------
> derby.connection.requireAuthentication=true
> derby.authentication.provider=BUILTIN
> derby.user.SA=sapwd
> derby.user.MARY=marypwd
> Also a similar trick could be attempted against the actual data files, 
> allowing a user to attempt to bypass grant/revoke security, especially no 
> that binary data can be exported/imported.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to