[ 
https://issues.apache.org/jira/browse/JCRVLT-427?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17089346#comment-17089346
 ] 

Angela Schreiber edited comment on JCRVLT-427 at 4/22/20, 8:15 AM:
-------------------------------------------------------------------

[~tripod], thanks for the insight... so the problem is that the hooks allow for 
code execution, which is not covered by any privileges because the repository 
is not aware of the subtleties of the layers above the repository that fail to 
properly separate between application code and content. and since executing 
code may lead to complete system takeover and thus was considered a privilege 
escalation, which was prevented by making this feature available to those users 
that anyway have full access.

[~henzlerg], as far as i know the list of paths that contain application code 
is configurable as well and just assuming that it's just /libs and /apps might 
not be true. also, you can test if a given session has the ability to write at 
a given path but if i remember correctly it's not possible to know if the whole 
subtree is writable. i am not sure from your suggestion, which of the two you 
were envisioning.

to summarize:
unless we have some means in place to mitigate the potentially severe privilege 
escalation that come with the hooks, i would leave some sort of extra check in 
place that limits the execution of hooks to administrative principals even if 
that means an additional configuration option. and a configuration option 
naming principals feels more natural to me. the check for access to paths that 
contain application content might work, but i wouldn't hard code it and we 
might in fact miss other subtleties that could lead to vulnerabilities.


was (Author: anchela):
[~tripod], thanks for the insight... so the problem is that the hooks allow for 
code execution, which is not covered by any privileges because the repository 
is not aware of the subtleties of the layers above the repository that fail to 
properly separate between application code and content. and since executing 
code may lead to complete system takeover and thus was considered a privilege 
escalation, which was prevented by making this feature available to those users 
that anyway have full access.

[~henzlerg], as far as i know the list of paths that contain application code 
is configurable as well and just assuming that it's just /libs and /apps might 
not be true. also, you can test if a given session has the ability to write at 
a given path but if i remember correctly it's not possible to know if the whole 
subtree is writable. i am not sure from your suggestion, which of the two you 
were envisioning.

> Allow installation of packages with hook for users without admin privileges
> ---------------------------------------------------------------------------
>
>                 Key: JCRVLT-427
>                 URL: https://issues.apache.org/jira/browse/JCRVLT-427
>             Project: Jackrabbit FileVault
>          Issue Type: Improvement
>          Components: vlt
>            Reporter: Konrad Windszus
>            Assignee: Konrad Windszus
>            Priority: Major
>             Fix For: 3.4.6
>
>
> Currently due to the check in 
> https://github.com/apache/jackrabbit-filevault/blob/e257001ec22ea06bcc987cbf79f0cc9b15c4e186/vault-core/src/main/java/org/apache/jackrabbit/vault/packaging/impl/ZipVaultPackage.java#L184
>  packages containing a hook can only be installed by admins.
> Although I do understand the intent of that I think this is not flexible 
> enough as currently that only gives the rights to users "admin", "system" or 
> members of group "administrators". Instead there should be an OSGi 
> configuration which allows to configure to grant the right to install 
> packages with hooks to other groups as well!



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to