Hi,  Just don't put configuration resources there.  Here's what I use
(since I wrote it up heheh):

http://wiki.apache.org/tapestry/Tapestry5WhereToStoreConfigurationResources



http://wiki.apache.org/tapestry/Tapestry5WhereToStoreExternalResources



On 7/26/07, Thiago H de Paula Figueiredo <[EMAIL PROTECTED]> wrote:
Hi!

I'm developing a Tapestry 5 application and I was looking at access to
assets via URLs. I typed http://localhost:8080/assets/tapestry/default.css
to take a look at T5 default CSS values.

Then I typed http://localhost:8080/assets/hibernate.cfg.xml . . . and it
showed that file. It's a security flaw.
Is there any measure already implemented against this kind of attack? It
would be very nice if we could block asset access to files and folders
through some Tapestry-IoC contribution. ;)

Thiago

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to