On Tue, 13 Sep 2016, John Dougrez-Lewis wrote:
Surely the security vulnerability could have been fixed by disallowing
"file://" variants in the URL rather than removing the feature altogether?

Or were there other implementation issues relating to the fileUrl feature
that meant it was best removed ?

As the fetch is done by the server, it could allow you to fetch documents that you as a user couldn't see/access/reach but the server could. It also has some denial of service risks too, plus doesn't have things you want from a web spider like pools / limits / robots.txt acceptance etc.

Nick

Reply via email to