-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SEC-2189: <sec:authorize url=""> could use wrong WebInvocationPrivilegeEvaluator #2416
Comments
Kazuki Shimizu said: Hi Rob. Are there the plan to resolve this issue ? There is an good alternative method for resolve ? |
Kazuki Shimizu said: Hi Rob. I sent the pull-request. |
Kazuki Shimizu said: I re-sent pull-request. |
Wow, I can't believe this bug wasn't fixed yet |
Unfortunately this isn't that straight forward. The problem is that the This means in order to select the proper I've been considering some other approaches like using the Spring MVC methods to determine access. However, this has problems since method security can access variables which may be resolved using the "future" request as well. In short, this is not an easy problem to solve. The way around it is to use the |
Well, you can make a fake request to the url, and see it it gets permitted. Otherwise, just disable the url functionality completely, since it's not working as advertised. |
Thanks for the suggestion. This has the downside of actually performing the number of requests for the number of links you have on the page. I'm not sure this is a good approach. What's more is how would the JSP tag library implement this? We do not know what JavaScript libraries are included in the page and do not want to mandate any particular JavaScript library (or even JavaScript at all) to use the lib. If you really wanted to, you could pretty readily perform this logic with the JavaScript library of your choice. However, I'm not sure it is something I would do (because it is unlikely to scale well). |
well, you can use resttemplate on server side.. |
You cannot do it server side because, as previously mentioned, you don't
|
q (Migrated from SEC-2189) said:
When using <sec:authorize url=""> it is possible situation when wrong WebInvocationPrivilegeEvaluator is used for access evaluation
It occurs when in security xml descriptor there're different contexts
and in the jsp in second context we use <sec:authorize url=""> to access url from second context.
for example:
in security.xml:
in /admin/index.jsp:
on the /admin/index.jsp link will be displayed even if user doesn't have ROLE_ADMIN
It appears that the problem is in
The text was updated successfully, but these errors were encountered: