Improve default security of Shale Remoting
------------------------------------------

                 Key: SHALE-362
                 URL: http://issues.apache.org/struts/browse/SHALE-362
             Project: Shale
          Issue Type: Bug
          Components: Remoting
    Affects Versions: 1.0.4-SNAPSHOT
            Reporter: Craig McClanahan
             Fix For: 1.0.4-SNAPSHOT


The current "out of the box" security of Shale Remoting is better (in 
1.0.4-SNAPSHOT) than it was in 1.0.3, but still needs to be improved:

* "Dynamic" processor should exclude by default all managed bean
  names that are implicitly defined in the JSF spec, and have public
  zero-args methods that might mess things up.  (Example: executing
  #{applicationScope.clear} would be bad.

* All processors should be enhanced to *always* obey their default
  exclude lists, even if the user specifies additional exclude patterns.


-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: 
http://issues.apache.org/struts/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to