[Lift] Re: Lift security vulnerability

2010-03-08 Thread Dano
Thanks Joni! I appreciate the sample code. Dan On Mar 7, 8:10 am, Joni Freeman freeman.j...@gmail.com wrote: Note, it is very easy to clean up the JSON before rendering by using 'map' function: json map {   case JString(s) = JString(sripOutBinaryChars(s))   case x = x } (You just

[Lift] Re: Lift security vulnerability

2010-03-07 Thread Joni Freeman
Note, it is very easy to clean up the JSON before rendering by using 'map' function: json map { case JString(s) = JString(sripOutBinaryChars(s)) case x = x } (You just need to implement that sripOutBinaryChars function...). Cheers Joni On Mar 5, 8:26 pm, Dano olearydani...@gmail.com wrote:

[Lift] Re: Lift security vulnerability

2010-03-05 Thread Dano
I would never claim to be astute. However, I did observe that demo.liftweb.net is now built using 2.0-M3 as is clearly listed at the bottom of the page. I also observed that the Wizard example is still broken (paste binary characters into 'First Name' and then click the Next button). I have not

Re: [Lift] Re: Lift security vulnerability

2010-03-05 Thread Naftoli Gugenheim
Can you reproduce the vulnerability in your own M3 app? - Danoolearydani...@gmail.com wrote: I would never claim to be astute. However, I did observe that demo.liftweb.net is now built using 2.0-M3 as is clearly listed at the bottom of the page. I also

[Lift] Re: Lift security vulnerability

2010-03-05 Thread Dano
I can reproduce it in our application, but I think it is not necessarily due to Lift. This is what I am trying to sort out. We have client-side javascript which is sending JSON commands to the server and things blow up once things come back from the server. In this case, Lift is not responsible

[Lift] Re: Lift security vulnerability

2010-03-05 Thread Dano
I think I would like to amend my last post by asking if it is possible that the lift-json library support the ability to strip out binary characters since many times an application uses the results of JSON operations to render back to the client. Thanks. Dan On Mar 5, 9:53 am, Dano

Re: [Lift] Re: Lift security vulnerability

2010-03-05 Thread David Pollak
On Fri, Mar 5, 2010 at 9:32 AM, Dano olearydani...@gmail.com wrote: I would never claim to be astute. However, I did observe that demo.liftweb.net is now built using 2.0-M3 as is clearly listed at the bottom of the page. I also observed that the Wizard example is still broken (paste binary

Re: [Lift] Re: Lift security vulnerability

2010-03-05 Thread David Pollak
On Fri, Mar 5, 2010 at 10:26 AM, Dano olearydani...@gmail.com wrote: I think I would like to amend my last post by asking if it is possible that the lift-json library support the ability to strip out binary characters since many times an application uses the results of JSON operations to

Re: [Lift] Re: Lift security vulnerability

2010-03-05 Thread Timothy Perrett
Agreed - it works fine even with double byte characters... Cheers, Tim On 5 Mar 2010, at 18:41, David Pollak wrote: I don't know what you mean by pasting binary characters -- You received this message because you are subscribed to the Google Groups Lift group. To post to this group, send

[Lift] Re: Lift security vulnerability

2010-03-05 Thread Dano
I should have been more clear on 'pasting binary characters'. At the url http://www.webmasterworld.com/forum39/1098.htm, they talk about an issue with binary characters. I copied the 'square character' text (which I have confirmed are binary) from that page into the Wizard example on the demo

Re: [Lift] Re: Lift security vulnerability

2010-03-05 Thread David Pollak
On Fri, Mar 5, 2010 at 12:06 PM, Dano olearydani...@gmail.com wrote: I should have been more clear on 'pasting binary characters'. At the url http://www.webmasterworld.com/forum39/1098.htm, they talk about an issue with binary characters. I copied the 'square character' text (which I have

[Lift] Re: Lift security vulnerability

2010-03-04 Thread Dano
Just saw that Lift 2.0-M3 was released. I looked to see if the vulnerability was still present in demo.liftweb.net and I am still able to generate exceptions in the browser when I paste binary characters in the textfields for the Wizard, Wizard Challenge, and Arc Challenge examples in the Misc

Re: [Lift] Re: Lift security vulnerability

2010-03-04 Thread David Pollak
On Thu, Mar 4, 2010 at 4:33 PM, Dano olearydani...@gmail.com wrote: Just saw that Lift 2.0-M3 was released. I looked to see if the vulnerability was still present in demo.liftweb.net And the astute and not-so-astute observer will note at the bottom of each page on demo.liftweb.net: Lift

Re: [Lift] Re: Lift security vulnerability

2010-03-04 Thread Naftoli Gugenheim
What version is the demo running? - Danoolearydani...@gmail.com wrote: Just saw that Lift 2.0-M3 was released. I looked to see if the vulnerability was still present in demo.liftweb.net and I am still able to generate exceptions in the browser when I paste

Re: [Lift] Re: Lift security vulnerability

2010-03-04 Thread Ross Mellgren
Check dpp's response as of 8:01 -Ross On Mar 4, 2010, at 7:49 PM, Naftoli Gugenheim wrote: What version is the demo running? - Danoolearydani...@gmail.com wrote: Just saw that Lift 2.0-M3 was released. I looked to see if the vulnerability was still

[Lift] Re: Lift security vulnerability

2010-02-24 Thread Dano
The recent scala days conference activity may have cause the updates to this thread to escape notice. Just wondering if there is concern about the remaining binary character problems I noted in my prior post. Thanks in advance. Dan On Feb 22, 1:34 pm, Dano olearydani...@gmail.com wrote: More

[Lift] Re: Lift security vulnerability

2010-02-22 Thread Dano
More information on this in case anyone is interested. If you go to the lift demo website, it appears the issue with characters is mostly addressed except for the Misc code section. Specifically, the Wizard, Wizard Challenge and Arc Challenge #1 examples will generate XML parsing errors. For

[Lift] Re: Lift security vulnerability

2010-02-17 Thread Dano
Hello, I was wondering if the fix for the control characters issue was included in 2.0-M2. I just did a test with our Lift application built with 2.0-M2 and I am still seeing problems (i.e. javascript exceptions - NS_ERROR_INVALID_POINTER). Thanks in advance. Dan On Feb 3, 9:08 am, David

[Lift] Re: Lift security vulnerability

2010-02-02 Thread aw
On Feb 2, 4:57 pm, David Pollak feeder.of.the.be...@gmail.com wrote: I'd like to get a sense of how important the community views this defect. Is it a backport the fix to every milestone and release yesterday or is it a fix it in 2.0-M2 or someplace in between. I vote for 2.0-M2. -- You