Skip to content

Commit

Permalink
Provide a mechanism that enables the container to check if a componen…
Browse files Browse the repository at this point in the history
…t (typically a web application) has been granted a given permission when running under a SecurityManager without the current execution stack having to have passed through the component. Use this new mechanism to extend SecurityManager protection to the system property replacement feature of the digester.

git-svn-id: https://svn.apache.org/repos/asf/tomcat/tc7.0.x/trunk@1754728 13f79535-47bb-0310-9956-ffa450edef68
  • Loading branch information
markt-asf committed Aug 1, 2016
1 parent 3fcd0ca commit 0b41766
Show file tree
Hide file tree
Showing 4 changed files with 84 additions and 1 deletion.
24 changes: 23 additions & 1 deletion java/org/apache/catalina/loader/WebappClassLoaderBase.java
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,7 @@
import org.apache.tomcat.util.compat.JreCompat;
import org.apache.tomcat.util.compat.JreVendor;
import org.apache.tomcat.util.res.StringManager;
import org.apache.tomcat.util.security.PermissionCheck;

/**
* Specialized web application class loader.
Expand Down Expand Up @@ -135,7 +136,7 @@
* @author Craig R. McClanahan
*/
public abstract class WebappClassLoaderBase extends URLClassLoader
implements Lifecycle, InstrumentableClassLoader {
implements Lifecycle, InstrumentableClassLoader, PermissionCheck {

private static final org.apache.juli.logging.Log log =
org.apache.juli.logging.LogFactory.getLog(WebappClassLoaderBase.class);
Expand Down Expand Up @@ -1935,6 +1936,27 @@ protected PermissionCollection getPermissions(CodeSource codeSource) {
}


@Override
public boolean check(Permission permission) {
if (!Globals.IS_SECURITY_ENABLED) {
return true;
}
Policy currentPolicy = Policy.getPolicy();
if (currentPolicy != null) {
ResourceEntry entry = findResourceInternal("/", "/", false);
if (entry != null) {
CodeSource cs = new CodeSource(
entry.codeBase, (java.security.cert.Certificate[]) null);
PermissionCollection pc = currentPolicy.getPermissions(cs);
if (pc.implies(permission)) {
return true;
}
}
}
return false;
}


/**
* Returns the search path of URLs for loading classes and resources.
* This includes the original list of URLs specified to the constructor,
Expand Down
10 changes: 10 additions & 0 deletions java/org/apache/tomcat/util/digester/Digester.java
Original file line number Diff line number Diff line change
Expand Up @@ -26,11 +26,13 @@
import java.lang.reflect.InvocationTargetException;
import java.net.URI;
import java.net.URISyntaxException;
import java.security.Permission;
import java.util.EmptyStackException;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import java.util.PropertyPermission;

import javax.xml.parsers.ParserConfigurationException;
import javax.xml.parsers.SAXParser;
Expand All @@ -40,6 +42,7 @@
import org.apache.juli.logging.LogFactory;
import org.apache.tomcat.util.ExceptionUtils;
import org.apache.tomcat.util.IntrospectionUtils;
import org.apache.tomcat.util.security.PermissionCheck;
import org.xml.sax.Attributes;
import org.xml.sax.EntityResolver;
import org.xml.sax.ErrorHandler;
Expand Down Expand Up @@ -81,6 +84,13 @@ private static class SystemPropertySource
implements IntrospectionUtils.PropertySource {
@Override
public String getProperty( String key ) {
ClassLoader cl = Thread.currentThread().getContextClassLoader();
if (cl instanceof PermissionCheck) {
Permission p = new PropertyPermission(key, "read");
if (!((PermissionCheck) cl).check(p)) {
return null;
}
}
return System.getProperty(key);
}
}
Expand Down
43 changes: 43 additions & 0 deletions java/org/apache/tomcat/util/security/PermissionCheck.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.tomcat.util.security;

import java.security.Permission;

/**
* This interface is implemented by components to enable privileged code to
* check whether the component has a given permission.
* This is typically used when a privileged component (e.g. the container) is
* performing an action on behalf of an untrusted component (e.g. a web
* application) without the current thread having passed through a code source
* provided by the untrusted component. Because the current thread has not
* passed through a code source provided by the untrusted component the
* SecurityManager assumes the code is trusted so the standard checking
* mechanisms can't be used.
*/
public interface PermissionCheck {

/**
* Does this component have the given permission?
*
* @param permission The permission to test
*
* @return {@code false} if a SecurityManager is enabled and the component
* does not have the given permission, otherwise {@code false}
*/
boolean check(Permission permission);
}
8 changes: 8 additions & 0 deletions webapps/docs/changelog.xml
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,14 @@
<bug>59839</bug>: Apply <code>roleSearchAsUser</code> to all nested searches
in JNDIRealm. (fschumacher)
</fix>
<add>
Provide a mechanism that enables the container to check if a component
(typically a web application) has been granted a given permission when
running under a SecurityManager without the current execution stack
having to have passed through the component. Use this new mechanism to
extend SecurityManager protection to the system property replacement
feature of the digester. (markt)
</add>
</changelog>
</subsection>
<subsection name="Coyote">
Expand Down

0 comments on commit 0b41766

Please sign in to comment.