Any
thing dealing with security, (including security validation) keep it in the
request scope. That way no other developer (at runtime) can access the security
data.
[Nanduri, Amarnath] -----Original Message----- From: Hogan, John [mailto:[EMAIL PROTECTED]] Sent: Monday, May 07, 2001 1:10 PM To: '[EMAIL PROTECTED]' Subject: RE: Potential Security Flaw in Struts MVC
|
- RE: Potential Security Flaw in Struts MVC Michael Rimov
- Re: Potential Security Flaw in Struts... Peter Alfors
- Re: Potential Security Flaw in Struts MVC Jeff Trent
- Re: Potential Security Flaw in Struts MVC Ted Husted
- Re: Potential Security Flaw in Struts... Jeff Trent
- RE: Potential Security Flaw in Struts MVC Hogan, John
- Re: Potential Security Flaw in Struts MVC Jeff Trent
- RE: Potential Security Flaw in Struts MVC Jason Chaffee
- Re: Potential Security Flaw in Struts MVC Jeff Trent
- RE: Potential Security Flaw in Struts MVC Christian Cryder
- RE: Potential Security Flaw in Struts MVC Nanduri, Amarnath
- RE: Potential Security Flaw in Struts MVC George, Carl
- RE: Potential Security Flaw in Struts MVC Curt Hagenlocher
- RE: Potential Security Flaw in Struts MVC Shunhui Zhu
- Re: Potential Security Flaw in Struts MVC casey kochmer
- RE: Potential Security Flaw in Struts MVC Anthony Martin
- RE: Potential Security Flaw in Struts MVC Manabendra Sarkar
- Re: Potential Security Flaw in Struts MVC Martin Duffy
- RE: Potential Security Flaw in Struts MVC Craig R. McClanahan
- RE: Potential Security Flaw in Struts MVC Assenza, Chris
- RE: Potential Security Flaw in Struts MVC Yi-Xiong Zhou