#544: Potentially unsafe global request data is accessible in
Action::initialize() and View::initialize() and others
---------------------+------------------------------------------------------
 Reporter:  david    |       Owner:  david    
     Type:  defect   |      Status:  new      
 Priority:  high     |   Milestone:  0.11     
Component:  _OTHER_  |     Version:  0.11.0RC5
 Severity:  major    |    Keywords:           
---------------------+------------------------------------------------------
 Not sure if we regard this a bug or not.

 My suggestion is to lock the request for both, and also during other calls
 like {{{isSecure()}}} and {{{getCredentials()}}}.

 The reason why I think this needs fixing is that if we encourage people to
 change the output type in a view's initialize method based on request
 data, then there shouldn't be a way to access potentially insecure request
 data there.

 I don't think there is a use case for accessing the request data in
 {{{Action::initialize()}}}, and most people probably did the right thing
 and used the container's request data in {{{View::initialize()}}} anyway,
 so there shouldn't be much BC breakage (we could label this a security fix
 and just forget about it, or make this "hardened" mode configurable).

 Opinions please?

-- 
Ticket URL: <http://trac.agavi.org/ticket/544>
Agavi <http://www.agavi.org/>
An MVC Framework for PHP5


_______________________________________________
Agavi Tickets Mailing List
[email protected]
http://lists.agavi.org/mailman/listinfo/tickets

Reply via email to