[ 
https://issues.apache.org/jira/browse/SOLR-13987?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16988104#comment-16988104
 ] 

Robert Muir commented on SOLR-13987:
------------------------------------

Its really insecure that the current admin UI relies on eval(). It is a real 
security issue. I *will* fix this issue if nobody gets there first. Its 
bullshit to say that "oh its behind a firewall, so we can write insecure code 
and be lazy". There is such a thing as internal threats, for example. And its 
important to not just disable dangerous things by default, but ultimately 
either fix or remove them. Insecure code is a problem.

Separately, doing things like making it opt-in as Joel suggests are really good 
short term solutions.



> fix admin UI to not rely on javascript eval()
> ---------------------------------------------
>
>                 Key: SOLR-13987
>                 URL: https://issues.apache.org/jira/browse/SOLR-13987
>             Project: Solr
>          Issue Type: Improvement
>      Security Level: Public(Default Security Level. Issues are Public) 
>            Reporter: Robert Muir
>            Priority: Major
>
> Followup from SOLR-13982: currently any CSP is weak because it must allow 
> this eval: means arbitrary javascript can still be executed. 
> Let's fix the admin UI to not require eval so it can be disabled by the 
> browser.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org

Reply via email to