On Thu, Jun 8, 2017 at 7:05 AM, sebb <seb...@gmail.com> wrote:
> On 8 June 2017 at 11:49, John D. Ament <john.d.am...@gmail.com> wrote:
>> The whole path seems a bit weird to me.  I'm not 100% sure why it even
>> detects it as a possibly tainted value since the podling's information
>> should have been read externally rather than from the request.
>
> If it cannot be insecure, then just unconditionally taint.
> For example, __FILE__ should be safe to untaint without needing to check.

Agree with Sebb's advice, but content read externally should be
untrusted and verified clean before untainting.  In this case, this is
content from a podlings.xml file, which any committer could put
something there.

That being said, I'm not sure it is worth it to invest in a custom
error when the content doesn't match, the security error raised should
be sufficient.

- Sam Ruby

Reply via email to