- From: Elliotte Harold <erharold@gmail.com>
- Date: Sun, 30 Sep 2007 06:10:10 -0400
- To: uri@w3.org
- Cc: elharo@metalab.unc.edu
- Message-ID: <49aa580c0709280621g542d52b6g893316d43165038e@mail.gmail.com>
I've just read the URI templating draft spec. Looks good overall, except for section 4 which feels like it should be expanded. Section 4 reads: 4. Security Considerations A URI Template does not contain active or executable content. Other security considerations are the same as those for URIs, see section 7 of RFC3986. I am concerned that this is insufficiently "creative" in imagining possible attacks. In particular, I suspect that URI templates might be able to pass "bad" URIs through systems that would recognize and reject them if they were passed through as an expanded URI. Just maybe, it would be possible to run in reverse where a URI such as http://www.example.com/%7Bfoo%7D gets turned into http://www.example.com/{foo} and gets snuck into a system that will process the URI template. Likely these would rely on application bugs or omissions. Nonetheless these are not bugs or omissions that would cause problems today, so they may exist in current software and doubtless in careless software written in the future. Section 4 should consider such problems and warn readers about them. -- Elliotte Rusty Harold erharold@gmail.com
Received on Sunday, 30 September 2007 10:10:21 UTC