Hello,

are there any security mechanisms within trac (or python) to make sure
that a trac plugin does not compromise the whole trac server? Are there
any restrictions on the execution of trac plugins?

For instance, if you have a standard Apache/Trac/SVN installation with
multiple projects hosted, I can imagine the following security issue:

- The administrator of trac project A chooses a trivial password (shame
on him!).
- The administrator of trac project B chooses a serious password and
restricts the content of his project to a limited user group.
- By accident, a hacker cracks the password of admin A and - by means
of WebAdmin - uploads an malicious plugin (it's so easy to do so).
- The hacker modifies one of the wiki pages such that the new plugin is
triggered.
- As a result, the plugin may return some content of the protected
project B.

If there no technical provisions to avoid such situations, are there any
guidelines on how to setup a secure trac server environment? How can a
server administrator ensure security while granting trac administrator
rights to other people on the project level?

Thanks in advance! Your comments are highly appreciated!

Michael



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Trac 
Users" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/trac-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to