Hi,

The security reporter 'thiscodecc" created OFBIZ-12305 about "Groovy Program sandbox bypass". He suggested to use one of "the very mature solutions on the groovy sandbox on the market. You can refer to it.".

I had a look. The best article was from Cédric Champeau: https://melix.github.io/blog/2015/03/sandboxing.htmland clearly he does not advocate for "mature solutions on the groovy sandbox on the market".

So I rather fixed the issue with a "simple" and pragmatic approach by reusing the work I already did with SecuredUpload::isValidTextFile. I refactored it and created the public SecuredUpload::isValidText.

Finally, with OFBIZ-12324 I extracted the webshell tokens in the 
deniedWebShellTokens property in security.properties.

I had a deeper look at Cédric's article and I'm now convinced that, because only ProgramExport in Webtool was concerned we don't need to worry about Groovy Sandboxing.

If you don't think so, please explain why

TIA

Jacques

Reply via email to