> However, if someone is familiar with the db schema and the
> naming convention the developer used, that user could subvert
> the application by writing his own version of the UI which
> contains an "Administrative User Flag" field (or any other
> field for that matter) and the basic form processing in
> Struts will kindly honor the request and set the
> "Administrative Flag" on the user.  Unless, of course, the
> developer makes special provisions to prevent this behavior.

Creating a secure web application means that *every* HTTP
request should be checked for validity.  Any data that comes
from the client is suspect.  This is no more or less true
with Struts than without it.

--
Curt Hagenlocher
[EMAIL PROTECTED]

Reply via email to