raboof commented on PR #540:
URL: 
https://github.com/apache/commons-configuration/pull/540#issuecomment-2646141665

   > > For Commons Configuration 2.x, loading untrusted configuration files or 
performing operations
   > > on them should not allow code execution, and should not cause any denial 
of service situations.
   > 
   > What I understand here is that even if you allow external users to supply 
configuration files and you process them through Commons Configuration, no DoS 
or code execution will be triggered.
   
   Yes, that was my assumption - I could of course very well be wrong about 
that, I'm by no means a Commons Configuration expert. 
   
   > This is IMHO impossible to guarantee and we will have to publish CVEs like 
the recent one in Logback: 
[CVE-2024-12798](https://www.cve.org/CVERecord?id=CVE-2024-12798).
   
   AFAICT we *do* publish CVEs like that for Commons Configuration (e.g. 
https://www.cve.org/CVERecord?id=CVE-2022-33980 ). Are you aware of any places 
where Commons Configuration allows triggering code execution or DoS 'by design'?
   
   FWIW: I don't have a strong opinion on whether we 'should' consider 
configuration trusted or allow untrusted input - we should just clearly 
document the expectations ;) .


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to