You are viewing a plain text version of this content. The canonical link for it is here.
Posted to derby-dev@db.apache.org by "ASF subversion and git services (JIRA)" <ji...@apache.org> on 2014/09/29 20:52:35 UTC

[jira] [Commented] (DERBY-6636) The public api of BaseDataFileFactory may allow blackhats to assume elevated privileges.

    [ https://issues.apache.org/jira/browse/DERBY-6636?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14152056#comment-14152056 ] 

ASF subversion and git services commented on DERBY-6636:
--------------------------------------------------------

Commit 1628256 from [~rhillegas] in branch 'code/trunk'
[ https://svn.apache.org/r1628256 ]

DERBY-6636: Prevent blackhats from creating a BaseDataFileFactory; tests passed cleanly for me on derby-6636-01-aa-usederbyinternals.diff.

> The public api of BaseDataFileFactory may allow blackhats to assume elevated privileges.
> ----------------------------------------------------------------------------------------
>
>                 Key: DERBY-6636
>                 URL: https://issues.apache.org/jira/browse/DERBY-6636
>             Project: Derby
>          Issue Type: Bug
>          Components: Store
>    Affects Versions: 10.11.1.1
>            Reporter: Rick Hillegas
>         Attachments: derby-6636-01-aa-usederbyinternals.diff
>
>
> BaseDataFileFactory has a public constructor and a public boot() method. Arbitrary code running in the JVM may be able to instantiate a BaseDataFileFactory outside of Derby's authentication mechanisms and so acquire the ability to read/update Derby-managed data with the privileges granted to Derby.  Arbitrary code may be able to interfere with the normal operation of Derby and may be able to corrupt data.
> This is just an observation based on casual code inspection. It may be that there are mechanisms in place which frustrate these attacks. I have not tried to exploit these potential vulnerabilities myself.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)