Security considerations

The following security considerations exist:
  • The Map Converter application uploads files to the server file system and returns URLs that refer to these uploaded files. Application administrators must ensure that proper authorization is provided to users to avoid any security exposure. Care should be taken to make sure that the uploaded files do not consume excessive disk space, because currently cache control is not applied to these files.
  • The service receives a URL reference to the source map files to be used in the conversion. Administrative measures should be taken to make sure that this URL is not used as part of a denial of service attack on that remote server or on the local application server.
  • The application does not implement any authentication process. Therefore, all the uploaded files are accessible to any user connected to the service. The application can delete uploaded files, even those that have been uploaded by other users connected to the server.