Xalan-C++ does not have a Redirect extension (That extension _is_ present
in the Java version).  Xalan-C++, without any rogue extension functions,
will only generate output to the result tree, which is serialized to the
target you provide.

In general, it's very difficult to have a "secure" version of an XSLT
processor.  Someone can always write a stylesheet that cause infinite
recursion, which would pretty quickly crash the process.  It's pretty hard
to detect the difference between legitimate recursion and recursion which
would cause an endless loop.

Another potential security problem is the document() function, although
that involves reading, not writing.

Anyone who's interested in improving Xalan's "security" is welcome to
submit patches and/or enhancements.

Dave



                                                                                
                              
                      timo harmo                                                
                              
                      <[EMAIL PROTECTED]         To:      
[email protected]                          
                      inki.fi>                 cc:      (bcc: David N 
Bertoni/Cambridge/IBM)                  
                                               Subject: secure mode / redirect  
                              
                      02/27/2002 07:30                                          
                              
                      AM                                                        
                              
                                                                                
                              
                                                                                
                              



I just found out in comp.text.xml that xalan has a Redirect-extension.
(thread "1 input -> 3 outputs")

I'm writing a "cgi-frontend" that allows users to submit forms / files,
transforms the cgi-form variables to xml and lets users specify a
stylesheet to apply to that xml-file. I'd like to be sure that calling
testxslt -in xml_genatered_from_cgi-input -out somethingthatIallow.htm
-xsl anyfileanywhere.xsl
would only be able to write to the file I have allowed.

Are there other things besides Redirect that may be problematic in in
cgi-settings in xalan and should be disabled for some applications?

I think there could be also others that would like a "secure mode" for
xalan.

I use the C-version, and do not have a c-compiler.
 -Timo





Reply via email to