- 29 Jan, 2004 2 commits
-
-
Brian Lloyd authored
-
Brian Lloyd authored
-
- 27 Jan, 2004 11 commits
-
-
Fred Drake authored
-
Brian Lloyd authored
-
Brian Lloyd authored
-
Tres Seaver authored
-
Brian Lloyd authored
-
Brian Lloyd authored
-
Brian Lloyd authored
-
Brian Lloyd authored
-
Tres Seaver authored
-
Fred Drake authored
Python 2.3.3 doesn't need to import the types module here anymore
-
Tres Seaver authored
-
- 24 Jan, 2004 1 commit
-
-
Andreas Jung authored
-
- 21 Jan, 2004 3 commits
-
-
Brian Lloyd authored
-
Brian Lloyd authored
-
Shane Hathaway authored
-
- 20 Jan, 2004 1 commit
-
-
Shane Hathaway authored
xmlrpclib in Python 2.3+ includes support for nil values and basic auth, so Zope no longer needs to provide its own version.
-
- 19 Jan, 2004 4 commits
-
-
Brian Lloyd authored
-
Brian Lloyd authored
-
Brian Lloyd authored
-
Brian Lloyd authored
-
- 18 Jan, 2004 3 commits
-
-
Andreas Jung authored
-
Andreas Jung authored
-
Andreas Jung authored
-
- 16 Jan, 2004 5 commits
-
-
Brian Lloyd authored
-
Tres Seaver authored
-
Tres Seaver authored
-
Brian Lloyd authored
-
Brian Lloyd authored
-
- 15 Jan, 2004 10 commits
-
-
Tres Seaver authored
2.6 / 2.7 audit).
-
Tres Seaver authored
- ZConfig changes for ZSP.
-
Tres Seaver authored
- Merge a number of entangled issues from 2.6 / 2.7 audit: Iteration over sequences could in some cases fail to check access to an object obtained from the sequence. Subsequent checks (such as for attributes access) of such an object would still be performed, but it should not have been possible to obtain the object in the first place. List and dictionary instance methods such as the get method of dictionary objects were not security aware and could return an object without checking access to that object. Subsequent checks (such as for attributes access) of such an object would still be performed, but it should not have been possible to obtain the object in the first place. Use of "import as" in Python scripts could potentially rebind names in ways that could be used to avoid appropriate security checks. A number of newer built-ins were either unavailable in untrusted code or did not perform adequate security checking. Unpacking via function calls, variable assignment, exception variables and other contexts did not perform adequate security checks, potentially allowing access to objects that should have been protected. Class security was not properly intialized for PythonScripts, potentially allowing access to variables that should be protected. It turned out that most of the security assertions were in fact activated as a side effect of other code, but this fix is still appropriate to ensure that all security declarations are properly applied. DTMLMethods with proxy rights could incorrectly transfer those rights via acquisition when traversing to a parent object.
-
Tres Seaver authored
- Wire up security policy selection machinery to ZConfig (note that the 'C' policy is currently borked, but should be fixed very soon).
-
Tres Seaver authored
- Don't allow Unicode strings to be passed to response.write() (merged from 2.6 / 2.7 audit).
-
Tres Seaver authored
- HTTPResponse.py: CGI escapes (merged from 2.6 / 2.7 audit). - xmlrpc.py: Exclude "private" attributes when marshalling an instance as an XML-RPC dict (merged from 2.6 / 2.7 audit).
-
Tres Seaver authored
- SimpleTree.py: CGI escapes (merged from 2.6 / 2.7 audit). - Tree.py: prevent DoS agains tree state cookie decompression (merged from 2.6 / 2.7 audit).
-
Tres Seaver authored
- Prevent DoS attack against decompression of tree state cookie (merged from 2.6 / 2.7 audit).
-
Tres Seaver authored
- Bindings.py: verify access to 'context' and 'container' names before returning (merged from 2.6 / 2.7 audit). - dtml/scriptTry.dtml: CGI escapes (merged from 2.6 / 2.7 audit).
-
Tres Seaver authored
-