On Jan 16, 2007, at 14:11, Paul Duncan wrote:
> * Eric Hodel ([EMAIL PROTECTED]) wrote:
>> On Jan 12, 2007, at 22:58, Paul Duncan wrote:
>>> * Eric Hodel ([EMAIL PROTECTED]) wrote:
> [snipped]
>>>> RubyGems does not check installation paths for gems before writing
>>>> files.
>>>
>>> The potential security problems with RubyGems are actually much  
>>> worse
>>> than that.  Documentation and tests are executed as the user  
>>> doing the
>>> install (which, as you said, is usually root).  That means I can  
>>> embed
>>> arbitrary Ruby code in either the documentation template and it will
>>> usually be run as root.  For example:
>>
>> I don't think there's an easy way around this one.
>
> Easy is certainly subjective, but there are a couple ways to "fix" the
> documentation hole:

Currently no user-generated code is run to create the documentation.   
The RDoc tool doesn't eval anything, so I think generating  
documentation is safe.  (Of course, I'm not 100% certain you can't  
get code eval'd by running RDoc on it, only 99%)

Running unit tests and building extensions is less-safe.

-- 
Eric Hodel - [EMAIL PROTECTED] - http://blog.segment7.net

I LIT YOUR GEM ON FIRE!

_______________________________________________
Rubygems-developers mailing list
Rubygems-developers@rubyforge.org
http://rubyforge.org/mailman/listinfo/rubygems-developers

Reply via email to