[ https://issues.apache.org/jira/browse/SOLR-13987?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16988104#comment-16988104 ]
Robert Muir commented on SOLR-13987: ------------------------------------ Its really insecure that the current admin UI relies on eval(). It is a real security issue. I *will* fix this issue if nobody gets there first. Its bullshit to say that "oh its behind a firewall, so we can write insecure code and be lazy". There is such a thing as internal threats, for example. And its important to not just disable dangerous things by default, but ultimately either fix or remove them. Insecure code is a problem. Separately, doing things like making it opt-in as Joel suggests are really good short term solutions. > fix admin UI to not rely on javascript eval() > --------------------------------------------- > > Key: SOLR-13987 > URL: https://issues.apache.org/jira/browse/SOLR-13987 > Project: Solr > Issue Type: Improvement > Security Level: Public(Default Security Level. Issues are Public) > Reporter: Robert Muir > Priority: Major > > Followup from SOLR-13982: currently any CSP is weak because it must allow > this eval: means arbitrary javascript can still be executed. > Let's fix the admin UI to not require eval so it can be disabled by the > browser. -- This message was sent by Atlassian Jira (v8.3.4#803005) --------------------------------------------------------------------- To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org For additional commands, e-mail: issues-h...@lucene.apache.org