Do such URLs in skins actually result in incoming URLs containing
"..", or does it get resolved out when we generate the .css?

-- Adam


On 9/12/07, Jeanne Waldman <[EMAIL PROTECTED]> wrote:
>
>  Hi Simon,
>
>  Very good point. I have seen skin's have ".." in the background-image path.
> I forgot about that.
>
>  The reason for fixing this issue is that we feel it is a security issue if
> the use of the ".." in the path is such that the path goes outside of the
> 'root'.
>
>  If I switch to the old code path and log a warning about the deprecated URL
> usage, then the security issue will still exist.
>  It sounds like to fix the issue correctly, I'll have to make sure if the
> path contains ".." that the path doesn't take us outside the root. e.g.,
>  foo/bar/../../zoo/../.. -> takes you outside root.
>
>  A side note -- I found a bug in the DirectoryResourceLoader where it was
> allowing paths outside the root directory, even though the comment
>  said that it wasn't. I can fix that easily, and I will log a separate issue
> and fix that since it isn't controversial.
>
>  Thanks again for your comments,
>  - Jeanne
>
>
>  Simon Lessard wrote:
> Hello Jeanne,
>
>  Personally you won't break anything with my projects, but it's only because
> I fully converted the skin to use the new Trinidad URL system (well it's
> more Trinidad URL system than new actually). However, preventing the '..'
> will most likely make the passage between ADF Faces and Trinidad more
> difficult as '..' was often needed with ADF Faces and background-image
> within skins. Would it be possible to do your change but if you detect '..',
> switch to the old code path and log a warning about a deprecated URL usage
> within the skin? We could offer a grace period until one month or so after
> JDeveloper 11g get in production maybe? I would use that date because the
> amount of Trinidad user will most likely get a big boost from old ADF Faces
> users when JDev 11 is officially released. Also, those new users will most
> likely have to do the aforementioned conversion.
>
>
>  Regards,
>
>  ~ Simon
>
>
> On 9/11/07, Jeanne Waldman <[EMAIL PROTECTED]> wrote:
> > My main concern is
> > a. should I simply reject any path with ".." in it as dangerous -or-
> >
> > b if the path contains ".." should figure out if it resolves to a path
> > outside the root and only reject it in that case.
> >
> > b is safer, but requires more processing.
> >
> > Thanks,
> >
> > - Jeanne
> >
> >
> > Jeanne Waldman wrote:
> > > Hi there,
> > > I'm about to fix issue:
> > > https://issues.apache.org/jira/browse/TRINIDAD-703
> > >
> > > snippet from issue:
> > >
> > > We register our image resource loader with a fairly loose pattern:
> > > register("(/.*\\.(css|jpg|gif|png|jpeg|svg|js))",
> > > new CoreClassLoaderResourceLoader(parent));
> > >
> > > In theory could someone get at an image on the class path outside of
> > > our own
> > > images by crafting a funky URL along the lines of
> > > "../../../../oracle/someotherpackage/foo.gif"? Yes.
> > > ClassLoaderResourceLoader should prevent access outside of the
> > > "rootPackage".
> > >
> > >
> > > I mention how I am fixing it (disallowing ".." in the path), so please
> > > comment if you'd like.
> > >
> > > Thanks,
> > > Jeanne
> > >
> > >
> >
>
>

Reply via email to