W3C home > Mailing lists > Public > public-xml-processing-model-wg@w3.org > November 2007

Security considerations: p:exec et al.

From: Rui Lopes <rlopes@di.fc.ul.pt>
Date: Fri, 30 Nov 2007 15:56:27 +0000
Message-ID: <475032AB.3040307@di.fc.ul.pt>
To: XMLProc List <public-xml-processing-model-wg@w3.org>
More dangerous than p:load, p:store or p:http-request, the p:exec is 
prone to abuse, especially on importing externally-defined pipeline 

We should say something about it either in Section 2.9 (Security 
Considerations), or in the step declaration (7.2.1).

p:xslt has the same problem, as some XSLT implementations (e.g., Saxon) 
afford embedding and executing arbitrary Java methods.

p:xquery might be prone to the same issue.


Received on Friday, 30 November 2007 15:56:43 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 21:32:45 UTC