Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sandbox document() and <exsl:document> #2053

Open
xworld21 opened this issue Mar 4, 2023 · 0 comments · May be fixed by #1951
Open

sandbox document() and <exsl:document> #2053

xworld21 opened this issue Mar 4, 2023 · 0 comments · May be fixed by #1951

Comments

@xworld21
Copy link
Contributor

xworld21 commented Mar 4, 2023

This is just attaching an issue to #1951. A user can call <exsl:document> and document() in a stylesheet, which raises two issues:

  • document() can read from anywhere (even the network); postprocessing can be made safe against malicious input, since it does not allow arbitrary code execution, so it makes sense to sandbox document();
  • <exsl:document> can generate text, HTML, XML files, but it will do so relative to the current working folder rather than the destination directory (which would enable postprocessing to generate customizable XML manifests for instance).

#1951 addresses both.

Edit: changed title to emphasise the underlying security issue.

@dginev dginev added this to the LaTeXML-0.8.8 milestone Mar 4, 2023
@xworld21 xworld21 changed the title control document() and <exsl:document> sandbox document() and <exsl:document> Jul 30, 2023
@dginev dginev modified the milestones: LaTeXML-0.8.8, LaTeXML-0.9 Jan 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants