I must admit that I have not been focused too much on this list recently, so
I might have missed this topic, but I was thinking on the solution to
prevent security attacks on ww code that is potentially vulnerable for many
things. I remember Pat described those problems as "ease of access". In
fact - due to ease of access it's relatively easy to ommit serious security
problems. In many cases it's tempting just to add more beans to your
acctions that are exposed to ParameterInterceptor sometimes in a manner you
just haven't thinked of.

I once proposed some patches to ParameterInterceptor to filter values that
it passes using allow/deny regexp patterns. I'm using this solution for
myself. However the con is that I'm still actively involved in creating
security patterns. Humans are usually weakest links in security chains, so
I'm trying to eliminate myself from the process of defining security by
applying default "deny all" policy, then selectively opening only necessary
things.

So now I would propose to patch AbstractUITag to collect all 'name'
attribute values in a well-known place. Then this information may be used by
patched ParameterInterceptor to check what parameters are actually allowed
to pass.

-- Mike



-------------------------------------------------------
SF.Net is sponsored by: Speed Start Your Linux Apps Now.
Build and deploy apps & Web services for Linux with
a free DVD software kit from IBM. Click Now!
http://ads.osdn.com/?ad_id=1356&alloc_id=3438&op=click
_______________________________________________
Opensymphony-webwork mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/opensymphony-webwork

Reply via email to