On Jan 16, 2007, at 14:11, Paul Duncan wrote: > * Eric Hodel ([EMAIL PROTECTED]) wrote: >> On Jan 12, 2007, at 22:58, Paul Duncan wrote: >>> * Eric Hodel ([EMAIL PROTECTED]) wrote: > [snipped] >>>> RubyGems does not check installation paths for gems before writing >>>> files. >>> >>> The potential security problems with RubyGems are actually much >>> worse >>> than that. Documentation and tests are executed as the user >>> doing the >>> install (which, as you said, is usually root). That means I can >>> embed >>> arbitrary Ruby code in either the documentation template and it will >>> usually be run as root. For example: >> >> I don't think there's an easy way around this one. > > Easy is certainly subjective, but there are a couple ways to "fix" the > documentation hole:
Currently no user-generated code is run to create the documentation. The RDoc tool doesn't eval anything, so I think generating documentation is safe. (Of course, I'm not 100% certain you can't get code eval'd by running RDoc on it, only 99%) Running unit tests and building extensions is less-safe. -- Eric Hodel - [EMAIL PROTECTED] - http://blog.segment7.net I LIT YOUR GEM ON FIRE! _______________________________________________ Rubygems-developers mailing list Rubygems-developers@rubyforge.org http://rubyforge.org/mailman/listinfo/rubygems-developers