Yes, but we can do it via custom SecurityManager - as I understand
OGNL uses SM internally quite often.

2013/9/11 Christian Grobmeier <grobme...@gmail.com>:
> Am 11.09.13 07:54, schrieb Lukasz Lenart:
>> 2013/9/11 David Black <dbl...@atlassian.com>:
>>> On 9 September 2013 20:52, Christian Grobmeier <grobme...@gmail.com> wrote:
>>>
>>>
>>> From a security standpoint we may have the man power to improve things.
>>> For example, if we manage to "disable static method" calls from OGNL we
>>> would have a win already. If we manage to restrict the path of OGNL we
>>> might have another win.
>>> These security hardening proposals to OGNL sound like good starting points.
>> Maybe this can be a good starting point? It blocks Runtime.exec but we
>> can extend it.
>>
>> https://github.com/bytenibble/security-manager
> Sounds interesting. I thought if it would be better to improve Commons
> OGNL in a way users can configure their security aspects. This security
> manager is interesting thought.
>>
>> Regards
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org
> For additional commands, e-mail: dev-h...@struts.apache.org
>

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org
For additional commands, e-mail: dev-h...@struts.apache.org

Reply via email to