[
https://issues.jboss.org/browse/SEAMREMOTING-10?page=com.atlassian.jira.p...
]
Shane Bryzak resolved SEAMREMOTING-10.
--------------------------------------
Resolution: Out of Date
Closing this issue, the remoting support for eval() isn't going to be added back in.
Security concerns regarding Seam.Remoting.eval()
------------------------------------------------
Key: SEAMREMOTING-10
URL:
https://issues.jboss.org/browse/SEAMREMOTING-10
Project: Seam Remoting
Issue Type: Task
Reporter: Drew Kutchar
Assignee: Shane Bryzak
A malicious user can import the seam/remoting/resource/remote.js and use
Seam.Remoting.eval() to bypass @WebRemote restrictions and call any arbitrary method? This
can be a very serious security hole, even if Seam Remoting is not enabled (by marking any
components using @WebRemote).
Shane Bryzak stated that he is aware of this issue and has disabled Seam.Remoting.eval()
functionality until he finds a way for expression evaluations to honor the @WebRemote
annotation.
This JIRA is created to track Shane's work.
--
This message is automatically generated by JIRA.
For more information on JIRA, see:
http://www.atlassian.com/software/jira