Probably there was a misunderstanding Andrea.

First of all, are we talking about:
1. the "preliminar" patch, that at least prevents remote exploit by
disallowing malicious code,
or
2. the final patch? In this case, the final patch, is "1." or a patch that,
as I stated before, removes completely OGNL evaluation of user-entered
values?

I think that the conversation should follow two different direction: one for
the immediate future (to solve the vulnerability) and one for the final
decision.

Antonio

2007/7/16, Ing. Andrea Vettori <[EMAIL PROTECTED]>:

Antonio,

the recursion solve the problem because after the first "step" you
are exposing to the remote exploit. The first evaluation step is secure.

If you have %{foo} somewhere and you evaluate it if the property foo
does not contain an expression you are safe. If it contains an
expression you are recursive-evaluating and that's the problem.

You can't have a circular-reference (like the one that caused me to
find this big problem) if you disable recursion.

Moreover I think it is always a good coding practice when using
recursion to have a max loop limit to break off the loop if something
goes wrong.

It's the way the patch is implemented (I noticed my fault after
posting the patch) that prevents expression that is not recursive
like "%{foo} %{bar}" to be evaluated. I don't think it's a problem
but we should know that this type of expressions will not be
evaluated after installing the patch.

Maybe Don has addressed this kind of expression in his patch... I'll
take a look at it later.


Il giorno 16/lug/07, alle ore 16:09, Antonio Petrelli ha scritto:

> 2007/7/16, Ing. Andrea Vettori <[EMAIL PROTECTED]>:
>>
>> What about expression like "%{foo} %{bar}" that work with the current
>> version but don't work using the loopCounter patch ?
>>
>> I don't think we need them but who knows...
>
>
>
> I think that recursion is a false problem: it's up to the developer to
> control it (I don't think that JSP EL controls it, correct me if I am
> wrong). Eventually a log message can be written, but preventing it
> is not a
> solution, because a particular case (such as circular reference)
> will be
> always present.
> The "real" problem is that a user should not be allowed to execute
> such OGNL
> code!
>
> Antonio

--
Ing. Andrea Vettori
Consulente per l'Information Technology



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


Reply via email to