Hello, are there any security mechanisms within trac (or python) to make sure that a trac plugin does not compromise the whole trac server? Are there any restrictions on the execution of trac plugins?
For instance, if you have a standard Apache/Trac/SVN installation with multiple projects hosted, I can imagine the following security issue: - The administrator of trac project A chooses a trivial password (shame on him!). - The administrator of trac project B chooses a serious password and restricts the content of his project to a limited user group. - By accident, a hacker cracks the password of admin A and - by means of WebAdmin - uploads an malicious plugin (it's so easy to do so). - The hacker modifies one of the wiki pages such that the new plugin is triggered. - As a result, the plugin may return some content of the protected project B. If there no technical provisions to avoid such situations, are there any guidelines on how to setup a secure trac server environment? How can a server administrator ensure security while granting trac administrator rights to other people on the project level? Thanks in advance! Your comments are highly appreciated! Michael --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Trac Users" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/trac-users?hl=en -~----------~----~----~----~------~----~------~--~---
