I don't really see how you could have that vulnerability in web2py without 
explicitly programming for it. But no it does not protect you from 
yourself. How could we protect you from being a dumbass and using 
invalidated user input to get some file directly from the filesystem?  
  
Note, that this has happened in the admin application itself, but it's rare 
for you to have an app that has to do the kind of filesystem manipulations 
the admin does and we do not recommend the admin in production even though 
it is pretty safe right now.

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to web2py+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to