Hi guys, I have a question about the implementation of this security fix - I'm worried that it may break something that I rely on.
SHORT VERSION Does this fix prevent recursive evaluation when generating the HTML 'name' attribute as well as the 'value' attribute? LONG VERSION As I understand it the problem is that when you write something like <s:textfield name="phone" /> This generates an HTML tag where the value attribute is evaluated as something like value="%{phone}" and if %{phone} evaluates to %{1+1} ( for example) you get value="%{%{1+1}}" which recursively evaluates to value="2" so the fix is to turn of recursive OGNL evaluation so we will get value="%{1+1}" So far so good. My problem is that in a number of apps I have relied on the ability to do something like <s:textfield name="%{fieldnames.phoneFieldName}" /> and I provide a fieldnames object on the stack with the getPhoneFieldName() returning "phone" Which generates a HTML tag where the *name* attribute ( rather than the value attribute) is evaluated as name="%{fieldnames.phoneFieldName}" which evaluates to name="phone" in the HTML. This allows me to maintain all my field names ( and hence the mapping of these fields onto my domain) in one place, rather than having the same literal strings scattered through the application. So, my question (finally) is, will this still work with the security fix? I will get the fix and try it our myself as soon as I can get to it, but I thought I would ask here in the meantime. Cheers Perryn -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ted Husted Sent: Wednesday, 25 July 2007 1:47 AM To: Struts Users Mailing List Subject: [ANN] Struts 2.0.9 General Availability Release with Important Security Fix Apache Struts 2.0.9 is now available from <http://struts.apache.org/download.cgi#struts209?update=200707231930>. This release includes an important security fix regarding a remote code exploit. For more information about the exploit, visit our security bulletins page at <http://struts.apache.org/2.x/docs/s2-001.html>. * ALL DEVELOPERS ARE STRONGLY ADVISED TO UPDATE TO STRUTS 2.0.9 OR XWORK 2.0.4 IMMEDIATELY! For other changes included in Struts 2.0.9, see the release notes <http://struts.apache.org/2.0.9/docs/release-notes-209.html>. -Ted. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED] "This e-mail and any attachments to it (the "Communication") is, unless otherwise stated, confidential, may contain copyright material and is for the use only of the intended recipient. If you receive the Communication in error, please notify the sender immediately by return e-mail, delete the Communication and the return e-mail, and do not read, copy, retransmit or otherwise deal with it. Any views expressed in the Communication are those of the individual sender only, unless expressly stated to be those of Australia and New Zealand Banking Group Limited ABN 11 005 357 522, or any of its related entities including ANZ National Bank Limited (together "ANZ"). ANZ does not accept liability in connection with the integrity of or errors in the Communication, computer virus, data corruption, interference or delay arising from or in respect of the Communication." --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]