what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

asb00-10.spectra.preview

asb00-10.spectra.preview
Posted Jul 1, 2000
Site allaire.com

Allaire Security Bulletin (ASB00-10) - The Spectra Container Editor Preview does not properly enforce object security. Allaire has released a patch that addresses this issue.

SHA-256 | 8c3ae5d3c258a942638f700431baed582c7de0cf50aa4faf2bea5f4cf43d2183

asb00-10.spectra.preview

Change Mirror Download
Allaire Security Bulletin (ASB00-10)
Patch Available for Spectra Container Editor Preview Object Security Issue

Originally Posted: April 24, 2000
Last Updated: April 24, 2000

Summary
The Spectra Container Editor Preview does not properly enforce object security. Allaire has released a patch
that addresses this issue.

Issue
In Spectra, the container editor preview tool does not enforce object security. Any object-method placed in
the container object array by a publishing rule is invoked with security disabled by the container editor preview
tab.

For example, using the default schedule content rule, anyone with access to the container editor can schedule
the "display" method on an object they do not have permissions for and view it in the preview. The object will
not display on the page for that user if the page enables security, but it will display in the container editor
preview tab.

The following patch fixes the problem. After applying the patch, the container editor preview will enforce
object security and display an error if the user previewing the container does not have permission to invoke
object-methods in it.

Affected Software Versions

Allaire Spectra 1.0 and 1.0.1

What Allaire is Doing
Allaire has published this bulletin, notifying customers of the problem. Allaire has also released new templates
that will resolve the issue. These templates are available for download and inspection. Allaire also recommends
that users install sample applications and documentation on secured development servers, and not on
production servers.

The template files were created to replace the existing files on your system. It is recommended you back up your
existing data before over-writing or replacing any files.

Download - SPECTRA 1.0 Container Editor Preview Patch


What Customers Should Do
Customers should download and copy the new files into their respective directories, according to the table
below. The following is a list of which template goes in which directory:

File
Location
cfa_processdescriptorpreview.cfm
{spectraroot}\customtags\system\tier1\cfa_processdescriptorpreview.cfm
preview.cfm
{spectraroot}\handlers\system\container\preview.cfm


Revisions
April 24, 2000 -- Bulletin first created.

Reporting Security Issues
Allaire is committed to addressing security issues and providing customers with the information on how they
can protect themselves. If you identify what you believe may be a security issue with an Allaire product, please
send an email to secure@allaire.com. We will work to appropriately address and communicate the issue.

Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe significantly affects our products or customers,
we will notify customers when appropriate. Typically this notification will be in the form of a security bulletin
explaining the issue and the response. Allaire customers who would like to receive notification of new security
bulletins when they are released can sign up for our security notification service.

For additional information on security issues at Allaire, please visit the Security Zone at:
http://www.allaire.com/security

THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. ALLAIRE
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR
SPECIAL DAMAGES, EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR
INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close