[ 
https://issues.apache.org/jira/browse/SLING-524?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lars Trieloff updated SLING-524:
--------------------------------

    Attachment: SLING-524.patch

Following patch implements a set of restrictions (with test cases) on recma 
(restriced ECMA) and resp (restricted ECMA server pages):

- maximum script runtime is 1000 ms
- maximum stack depth is 100
- no access to Packages, so effectively disabling all java capabilities

This leaves us with a very restricted environment that allows to a certain 
degree user-contributed scripts. One attack vector that I can imagine is 
uploading scripts with excessive parse and compile time, so that the runtime 
checks on denial of service attacks are not effective.


> Restrict JavaScript Engine to allow running untrusted scripts for user-driven 
> templating
> ----------------------------------------------------------------------------------------
>
>                 Key: SLING-524
>                 URL: https://issues.apache.org/jira/browse/SLING-524
>             Project: Sling
>          Issue Type: New Feature
>          Components: Scripting
>    Affects Versions: 2.0.1
>            Reporter: Lars Trieloff
>         Attachments: SLING-524.patch
>
>
> If you want to allow users to run custom scripts inside sling, for instance 
> to allow them to theme personal websites or blogs it is necessary to restrict 
> the capabilities of the scripting environment so that users do not run 
> scripts that access system files, run resource-draining scripts or harm the 
> system in other ways.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to