[ 
https://issues.apache.org/jira/browse/DERBY-3083?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12543706
 ] 

Rick Hillegas commented on DERBY-3083:
--------------------------------------

Thanks for the clarification, Dan. By "private to Derby" I mean that the 
properties cannot be overridden by any scheme that I'm aware of. For instance, 
someone could try to override the properties on the boot command line--but 
these overrides would be ignored because Derby would forcibly set the 
properties to values it calculated.

Fixing DERBY-2362 could reduce the vulnerability. However, I don't understand 
how to fix DERBY-2362. The solutions which come to my mind seem to have the 
same small windows of vulnerability which we're discussing here. If we could 
figure out how those windows could in fact be exploited then we might be able 
to talk about a solution.

As you note, if there is a way to exploit this window, then it can be used to 
subvert the value of "derby.install.url" today. The incremental exposure seems 
very small to me.

> Network server demands a file called "derbynet.jar" in classpath
> ----------------------------------------------------------------
>
>                 Key: DERBY-3083
>                 URL: https://issues.apache.org/jira/browse/DERBY-3083
>             Project: Derby
>          Issue Type: Bug
>          Components: Tools
>    Affects Versions: 10.3.1.4
>            Reporter: Aaron Digulla
>         Attachments: derby-716-10-datatypesCollation-aa.diff
>
>
> The network server will not start if the derbynet jar is added under a 
> different name than "derbynet.jar" to the classpath. This makes it impossible 
> to use it in maven projects where the jar is renamed to 
> "derbynet-10.3.1.4.jar".
> This did work with 10.2.2.0

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to