Andreas Zeidler wrote:
hi guys,

i think i just found a pretty nasty security issue in zope 2.10.4, see http://mail.zope.org/pipermail/zope-dev/2007-July/029590.html for a more detailed explaination. the bug gives you completely unrestricted access in all view templates, which is probably not what we want, even though they cannot be changed ttw. well, actually i haven't tried customerizing them, but this actually should work...

anyway, if this turns out to hold true, i think we should either go back to 2.10.3 for our rc1 or wait until this issue is fixed -- in any case we shouldn't use 2.10.4 as is, imho. what do you think?

We certainly can't go back to 2.10.3, we depend on features and fixes in 2.10.4.

I think this is due to an issue I raised on the Five list a while back, and which Tres fixed.

Basically, I'd argue that .pt files for Five views are no less filesystem code than the .py files that house a view class. Previously, we had a weird situation where you got restrictedTraverse-like functionality using TALES (tal:replace='obj/attr') but not using python: expressions (tal:replace='python:obj.attr').

I have code which looks significantly funny or jumps through security hoops (arguably exposing too much information in the process) to deal with this bug (which is what I'd call it), and I'm really glad it's fixed. :)

Obviously, this may be a problem for five.customerize, which needs to be more restrictive. I suspect five.customerize would've had a "security hole" with python: expressions, though.

Martin

_______________________________________________
Framework-Team mailing list
Framework-Team@lists.plone.org
http://lists.plone.org/mailman/listinfo/framework-team

Reply via email to