billbar...@apache.org wrote:
> @@ -235,6 +224,9 @@
>    http://svn.apache.org/viewvc?rev=721708&view=rev
>    http://svn.apache.org/viewvc?rev=721886&view=rev
>    +1: markt, fhanik
> +   0: billbarker: Haven't tried to break it yet, but the 4th patch 
> potentially
> +      offers access to static fields in ELContextImpl and ELResolverImpl 
> that could 
> +      possibly be exploited by a malicious webapp.

Any thoughts on how to fix this? How about testing for a security manager and if
 one is present creating new instances of NullFunctionMapper and DefaultResolver
rather than re-using the static ones?

Mark


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to