[1][USEMAP] [2][USEMAP] [3][LINK] Allaire Security Bulletin (ASB00-10) Patch Available for Spectra Container Editor Preview Object Security Issue Originally Posted: April 24, 2000 Last Updated: April 24, 2000 Summary The Spectra Container Editor Preview does not properly enforce object security. Allaire has released a patch that addresses this issue. Issue In Spectra, the container editor preview tool does not enforce object security. Any object-method placed in the container object array by a publishing rule is invoked with security disabled by the container editor preview tab. For example, using the default schedule content rule, anyone with access to the container editor can schedule the "display" method on an object they do not have permissions for and view it in the preview. The object will not display on the page for that user if the page enables security, but it will display in the container editor preview tab. The following patch fixes the problem. After applying the patch, the container editor preview will enforce object security and display an error if the user previewing the container does not have permission to invoke object-methods in it. Affected Software Versions * Allaire Spectra 1.0 and 1.0.1 What Allaire is Doing Allaire has published this bulletin, notifying customers of the problem. Allaire has also released new templates that will resolve the issue. These templates are available for download and inspection. Allaire also recommends that users install sample applications and documentation on secured development servers, and not on production servers. The template files were created to replace the existing files on your system. It is recommended you back up your existing data before over-writing or replacing any files. [4]Download - SPECTRA 1.0 Container Editor Preview Patch What Customers Should Do Customers should download and copy the new files into their respective directories, according to the table below. The following is a list of which template goes in which directory: File Location cfa_processdescriptorpreview.cfm {spectraroot}\customtags\system\tier1\cfa_processdescriptorpreview.cfm preview.cfm {spectraroot}\handlers\system\container\preview.cfm Revisions April 24, 2000 -- Bulletin first created. Reporting Security Issues Allaire is committed to addressing security issues and providing customers with the information on how they can protect themselves. If you identify what you believe may be a security issue with an Allaire product, please send an email to secure@allaire.com. We will work to appropriately address and communicate the issue. Receiving Security Bulletins When Allaire becomes aware of a security issue that we believe significantly affects our products or customers, we will notify customers when appropriate. Typically this notification will be in the form of a security bulletin explaining the issue and the response. Allaire customers who would like to receive notification of new security bulletins when they are released can sign up for our security notification service. For additional information on security issues at Allaire, please visit the Security Zone at: [5]http://www.allaire.com/security THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. < a l l a i r e > Copyright © 1995-2000 Allaire Corp., All rights reserved. [6]Year 2000 (Y2K) [7]Site problems? [8]Service questions? [9]Privacy Policy References 1. LYNXIMGMAP:http://www.allaire.com/handlers/index.cfm?ID=15411&Method=Full#allaireHome 2. LYNXIMGMAP:http://www.allaire.com/handlers/index.cfm?ID=15411&Method=Full#tools 3. javascript:history.back() 4. http://download.allaire.com/patches/ASB00-10fix.zip 5. http://www.allaire.com/security 6. http://www.allaire.com/developer/year2000 7. mailto:webmaster@allaire.com 8. mailto:info@allaire.com 9. http://www.allaire.com/privacy/