*read-eval* false? #82

Closed
txrev319 opened this Issue Oct 31, 2013 · 2 comments

2 participants

@txrev319

At https://github.com/mmcgrana/ring/blob/master/ring-core/src/ring/middleware/session/cookie.clj#L92

should there be a

(binding [read-eval false] ) ?

Otherwise, it seems -- suppose some other vulnerability allowed the AES key to leak -- then we suddenly have the situation where the client can do arbitrary code execution by read macros?

@weavejester
Collaborator

You're right, but this bug has been fixed. You're looking at an old repository. Here's the latest code:

https://github.com/ring-clojure/ring/blob/master/ring-core/src/ring/middleware/session/cookie.clj#L81

@txrev319
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment