08.07.2017, 21:01, "Massimo Callegari via Development" 
<development@qt-project.org>:
> On Sat, Jul 08, 2017 at 11:24:56AM +0000, Massimo Callegari via Development 
> wrote:
>
>>>  2) Security ? There is none. If you deploy an application using a 
>>> TextField control with
>>>  echoMode: TextInput.Password, one can easily add some trivial JavaScript 
>>> code to the
>>>  comfortably reachable QtQuick/Controls.2/TextField.qml file and somehow 
>>> display/log a
>>>  password. In general, an end user can seriously mess up an application by 
>>> changing a few
>>>  text files. I'm also wondering how Linux distributions can accept this. In 
>>> my KDE Neon
>>>  distro I've got /usr/lib/x86_64-linux-gnu/qt5/qml/ full of QML files that 
>>> I can edit and
>>>  compromise my system.
>
>>  I'll not argue about the others, but this here is nonsense. Anyone who can 
>> edit
>>  /lib normally can also edit /etc etc.
>
> I disagree. The nonsense, instead, is comparing configuration files with 
> source files.
> Config files are usually parsed by an application, which (hopefully) filters 
> malicious intentions.
> QML files instead, are executed by the application no matter what.
> As long as "edited" QML files have a correct syntax, the QML engine executes 
> them.

Exactly the same situation exists with binary plugins of Qt. Anyone with write 
access to plugins
directory can put malicious code in plugin at it will be executed by Qt. 

>
> Massimo
> _______________________________________________
> Development mailing list
> Development@qt-project.org
> http://lists.qt-project.org/mailman/listinfo/development

-- 
Regards,
Konstantin
_______________________________________________
Development mailing list
Development@qt-project.org
http://lists.qt-project.org/mailman/listinfo/development

Reply via email to