If I remember correctly, there is a long-standing security
issue where anyone can view the stack scripts of ANY Rev
standalone by doing a "memory dump" WHILE the app is running.

This works EVEN if all stacks are completely password
protected (and therefore encrypted)!

Apparently this is caused by the RunRev engine decrypting
and reading the scripts into memory and keeping them there
in clear text for as long as the app/stacks are open.

I have no idea how to do a memory dump, but I'm sure many
do, and this security issue has kept us away from deploying
major apps using Rev.

By the way, this could also mean that the same security issue
plagues the browser plugin, if the same method of running
stacks is used.

This can be a major problem especially if the scripts contain
sensitive details such as database logins and so forth.

Can anyone from RunRev confirm if this major security issue
has been resolved?

Also, can anyone who knows how to do a memory dump provide
details on how this is done, so we can verify if this is
still happening for standalones built using the latest version
of Rev, and so that Kee can extract the needed scripts?


Kee Nethery wrote:

> Is there a way to view the scripts in the standalone or does runrev 
> purposefully make that difficult?
_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution

Reply via email to