Author: markt
Date: Mon Feb 22 11:21:42 2016
New Revision: 1731626

URL: http://svn.apache.org/viewvc?rev=1731626&view=rev
Log:
Announcements for 7 CVEs

Modified:
    tomcat/site/trunk/docs/index.html
    tomcat/site/trunk/docs/security-6.html
    tomcat/site/trunk/docs/security-7.html
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-6.xml
    tomcat/site/trunk/xdocs/security-7.xml
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/index.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/index.html?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/docs/index.html (original)
+++ tomcat/site/trunk/docs/index.html Mon Feb 22 11:21:42 2016
@@ -254,7 +254,8 @@ include:
 <ul>
 
 <li>Restore the default for mapperContextRootRedirectEnabled to
-    <code>true</code></li>
+    <code>true</code>
+</li>
 
 <li>Expand session attribute filtering on load/unload to all managers</li>
 

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Mon Feb 22 11:21:42 2016
@@ -215,6 +215,9 @@
 <a href="#Apache_Tomcat_6.x_vulnerabilities">Apache Tomcat 6.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_6.0.45">Fixed in Apache Tomcat 6.0.45</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_6.0.44">Fixed in Apache Tomcat 6.0.44</a>
 </li>
 <li>
@@ -324,6 +327,137 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_6.0.45">
+<span style="float: right;">11 February 2016</span> Fixed in Apache Tomcat 
6.0.45</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: Limited directory traversal</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174"; 
rel="nofollow">CVE-2015-5174</a>
+</p>
+
+    
+<p>When accessing resources via the <code>ServletContext</code> methods
+       <code>getResource()</code> <code>getResourceAsStream()</code> and
+       <code>getResourcePaths()</code> the paths should be limited to the
+       current web application. The validation was not correct and paths of the
+       form <code>"/.."</code> were not rejected. Note that paths starting with
+       <code>"/../"</code> were correctly rejected. This bug allowed malicious
+       web applications running under a security manager to obtain a directory
+       listing for the directory in which the web application had been 
deployed.
+       This should not be possible when running under a security manager.
+       Typically, the directory listing that would be exposed would be for
+       <code>$CATALINA_BASE/webapps.</code>
+</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1700900";>1700900</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 12 August 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 6.0.0 to 6.0.44</p>
+  
+    
+<p>
+<strong>Low: Directory disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345"; 
rel="nofollow">CVE-2015-5345</a>
+</p>
+
+    
+<p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    
+<p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1715216";>1715216</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1717216";>1717216</a>.</p>
+
+    
+<p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+       made public on 22 February 2016.</p>
+
+    
+<p>Affects: 6.0.0 to 6.0.44</p>
+  
+    
+<p>
+<strong>Low: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706"; 
rel="nofollow">CVE-2016-0706</a>
+</p>
+
+    
+<p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1722802";>1722802</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 27 December 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 6.0.0 to 6.0.44</p>
+
+    
+<p>
+<strong>Moderate: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714"; 
rel="nofollow">CVE-2016-0714</a>
+</p>
+
+    
+<p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1727166";>1727166</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1727182";>1727182</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 12 November 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 6.0.0 to 6.0.44</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_6.0.44">
 <span style="float: right;">12 May 2015</span> Fixed in Apache Tomcat 
6.0.44</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Mon Feb 22 11:21:42 2016
@@ -215,6 +215,15 @@
 <a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_7.0.68">Fixed in Apache Tomcat 7.0.68</a>
+</li>
+<li>
+<a href="#Fixed_in_Apache_Tomcat_7.0.67">Fixed in Apache Tomcat 7.0.67</a>
+</li>
+<li>
+<a href="#Fixed_in_Apache_Tomcat_7.0.65">Fixed in Apache Tomcat 7.0.65</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_7.0.59">Fixed in Apache Tomcat 7.0.59</a>
 </li>
 <li>
@@ -341,6 +350,235 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_7.0.68">
+<span style="float: right;">16 February 2016</span> Fixed in Apache Tomcat 
7.0.68</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: CSRF token leak</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351"; 
rel="nofollow">CVE-2015-5351</a>
+</p>
+
+    
+<p>The index page of the Manager and Host Manager applications included a
+       valid CSRF token when issuing a redirect as a result of an
+       unauthenticated request to the root of the web application. This token
+       could then be used by an attacker to construct a CSRF attack.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1720661";>1720661</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1720663";>1720663</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 8 December 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 7.0.1 to 7.0.67</p>
+
+    
+<p>
+<strong>Low: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706"; 
rel="nofollow">CVE-2016-0706</a>
+</p>
+
+    
+<p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1722801";>1722801</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 27 December 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 7.0.0 to 7.0.67</p>
+
+    
+<p>
+<strong>Moderate: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714"; 
rel="nofollow">CVE-2016-0714</a>
+</p>
+
+    
+<p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1726923";>1726923</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1727034";>1727034</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 12 November 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 7.0.0 to 7.0.67</p>
+
+    
+<p>
+<strong>Moderate: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763"; 
rel="nofollow">CVE-2016-0763</a>
+</p>
+
+    
+<p>
+<code>ResourceLinkFactory.setGlobalContext()</code> is a public method
+       and was accessible by web applications running under a security manager
+       without any checks. This allowed a malicious web application to inject a
+       malicious global context that could in turn be used to disrupt other web
+       applications and/or read and write data owned by other web
+       applications.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1725931";>1725931</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 18 January 2016
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 7.0.0 to 7.0.67</p>
+
+  
+</div>
+<h3 id="Fixed_in_Apache_Tomcat_7.0.67">
+<span style="float: right;">10 December 2015</span> Fixed in Apache Tomcat 
7.0.67</h3>
+<div class="text">
+  
+    
+<p>
+<strong>Low: Directory disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345"; 
rel="nofollow">CVE-2015-5345</a>
+</p>
+
+    
+<p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    
+<p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1715213";>1715213</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1717212";>1717212</a>.</p>
+
+    
+<p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+    made public on 22 February 2016.</p>
+
+    
+<p>Affects: 7.0.0 to 7.0.66</p>
+
+  
+<p>
+<i>Note: The issue below was fixed in Apache Tomcat 7.0.66 but the
+       release vote for the 7.0.66 release candidate did not pass. Therefore,
+       although users must download 7.0.67 to obtain a version that includes a
+       fix for this issue, version 7.0.66 is not included in the list of
+       affected versions.</i>
+</p>
+
+    
+<p>
+<strong>Low: Session Fixation</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346"; 
rel="nofollow">CVE-2015-5346</a>
+</p>
+
+    
+<p>When recycling the <code>Request</code> object to use for a new request,
+    the <code>requestedSessionSSL</code> field was not recycled. This meant 
that
+    a session ID provided in the next request to be processed using the 
recycled
+    <code>Request</code> object could be used when it should not have been. 
This
+    gave the client the ability to control the session ID. In theory, this 
could
+    have been used as part of a session fixation attack but it would have been
+    hard to achieve as the attacker would not have been able to force the 
victim
+    to use the 'correct' <code>Request</code> object. It was also necessary for
+    at least one web application to be configured to use the SSL session ID as
+    the HTTP session ID. This is not a common configuration.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1713187";>1713187</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 22 June 2014
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 7.0.5 to 7.0.65</p>
+
+  
+</div>
+<h3 id="Fixed_in_Apache_Tomcat_7.0.65">
+<span style="float: right;">19 October 2015</span> Fixed in Apache Tomcat 
7.0.65</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: Limited directory traversal</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174"; 
rel="nofollow">CVE-2015-5174</a>
+</p>
+
+    
+<p>When accessing resources via the <code>ServletContext</code> methods
+       <code>getResource()</code> <code>getResourceAsStream()</code> and
+       <code>getResourcePaths()</code> the paths should be limited to the
+       current web application. The validation was not correct and paths of the
+       form <code>"/.."</code> were not rejected. Note that paths starting with
+       <code>"/../"</code> were correctly rejected. This bug allowed malicious
+       web applications running under a security manager to obtain a directory
+       listing for the directory in which the web application had been 
deployed.
+       This should not be possible when running under a security manager.
+       Typically, the directory listing that would be exposed would be for
+       <code>$CATALINA_BASE/webapps.</code>
+</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1696284";>1696284</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1700898";>1700898</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 12 August 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 7.0.0 to 7.0.64</p>
+  
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_7.0.59">
 <span style="float: right;">4 February 2015</span> Fixed in Apache Tomcat 
7.0.59</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Mon Feb 22 11:21:42 2016
@@ -215,6 +215,15 @@
 <a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 8.0.32</a>
+</li>
+<li>
+<a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache Tomcat 8.0.30</a>
+</li>
+<li>
+<a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 8.0.27</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 8.0.17</a>
 </li>
 <li>
@@ -287,6 +296,236 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_8.0.32">
+<span style="float: right;">8 February 2016</span> Fixed in Apache Tomcat 
8.0.32</h3>
+<div class="text">
+
+  
+<p>
+<i>Note: The issues below were fixed in Apache Tomcat 8.0.31 but the
+       release vote for the 8.0.31 release candidate did not pass. Therefore,
+       although users must download 8.0.32 to obtain a version that includes
+       fixes for these issues, version 8.0.31 is not included in the list of
+       affected versions.</i>
+</p>
+
+    
+<p>
+<strong>Low: Session Fixation</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346"; 
rel="nofollow">CVE-2015-5346</a>
+</p>
+
+    
+<p>When recycling the <code>Request</code> object to use for a new request,
+    the <code>requestedSessionSSL</code> field was not recycled. This meant 
that
+    a session ID provided in the next request to be processed using the 
recycled
+    <code>Request</code> object could be used when it should not have been. 
This
+    gave the client the ability to control the session ID. In theory, this 
could
+    have been used as part of a session fixation attack but it would have been
+    hard to achieve as the attacker would not have been able to force the 
victim
+    to use the 'correct' <code>Request</code> object. It was also necessary for
+    at least one web application to be configured to use the SSL session ID as
+    the HTTP session ID. This is not a common configuration.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1713185";>1713185</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1723506";>1723506</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 22 June 2014
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    
+<p>
+<strong>Low: CSRF token leak</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351"; 
rel="nofollow">CVE-2015-5351</a>
+</p>
+
+    
+<p>The index page of the Manager and Host Manager applications included a
+       valid CSRF token when issuing a redirect as a result of an
+       unauthenticated request to the root of the web application. This token
+       could then be used by an attacker to construct a CSRF attack.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1720658";>1720658</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1720660";>1720660</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 8 December 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    
+<p>
+<strong>Low: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706"; 
rel="nofollow">CVE-2016-0706</a>
+</p>
+
+    
+<p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1722800";>1722800</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 27 December 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    
+<p>
+<strong>Moderate: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714"; 
rel="nofollow">CVE-2016-0714</a>
+</p>
+
+    
+<p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1726196";>1726196</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1726203";>1726203</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 12 November 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    
+<p>
+<strong>Moderate: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763"; 
rel="nofollow">CVE-2016-0763</a>
+</p>
+
+    
+<p>
+<code>ResourceLinkFactory.setGlobalContext()</code> is a public method
+       and was accessible by web applications running under a security manager
+       without any checks. This allowed a malicious web application to inject a
+       malicious global context that could in turn be used to disrupt other web
+       applications and/or read and write data owned by other web
+       applications.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1725929";>1725929</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 18 January 2016
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+  
+</div>
+<h3 id="Fixed_in_Apache_Tomcat_8.0.30">
+<span style="float: right;">6 December 2015</span> Fixed in Apache Tomcat 
8.0.30</h3>
+<div class="text">
+  
+    
+<p>
+<strong>Low: Directory disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345"; 
rel="nofollow">CVE-2015-5345</a>
+</p>
+
+    
+<p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    
+<p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1715207";>1715207</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1717209";>1717209</a>.</p>
+
+    
+<p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+    made public on 22 February 2016.</p>
+
+    
+<p>Affects: 8.0.0.RC1 to 8.0.29</p>
+
+  
+</div>
+<h3 id="Fixed_in_Apache_Tomcat_8.0.27">
+<span style="float: right;">1 October 2015</span> Fixed in Apache Tomcat 
8.0.27</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: Limited directory traversal</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174"; 
rel="nofollow">CVE-2015-5174</a>
+</p>
+
+    
+<p>When accessing resources via the <code>ServletContext</code> methods
+       <code>getResource()</code> <code>getResourceAsStream()</code> and
+       <code>getResourcePaths()</code> the paths should be limited to the
+       current web application. The validation was not correct and paths of the
+       form <code>"/.."</code> were not rejected. Note that paths starting with
+       <code>"/../"</code> were correctly rejected. This bug allowed malicious
+       web applications running under a security manager to obtain a directory
+       listing for the directory in which the web application had been 
deployed.
+       This should not be possible when running under a security manager.
+       Typically, the directory listing that would be exposed would be for
+       <code>$CATALINA_BASE/webapps.</code>
+</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1696281";>1696281</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1700897";>1700897</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 12 August 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 8.0.0-RC1 to 8.0.26</p>
+  
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_8.0.17">
 <span style="float: right;">16 January 2015</span> Fixed in Apache Tomcat 
8.0.17</h3>
 <div class="text">
@@ -296,7 +535,7 @@
 <i>Note: The issue below was fixed in Apache Tomcat 8.0.16 but the
        release vote for the 8.0.16 release candidate did not pass. Therefore,
        although users must download 8.0.17 to obtain a version that includes a
-       fix for this issue, versions 8.0.16 is not included in the list of
+       fix for this issue, version 8.0.16 is not included in the list of
        affected versions.</i>
 </p>
 

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Mon Feb 22 11:21:42 2016
@@ -215,7 +215,7 @@
 <a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</a>
 </li>
 <li>
-<a href="#Fixed_in_Apache_Tomcat_9.0.x">Fixed in Apache Tomcat 9.0.x</a>
+<a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a>
 </li>
 </ul>
 
@@ -266,11 +266,192 @@
 
   
 </div>
-<h3 id="Fixed_in_Apache_Tomcat_9.0.x">Fixed in Apache Tomcat 9.0.x</h3>
+<h3 id="Fixed_in_Apache_Tomcat_9.0.0.M3">
+<span style="float: right;">5 January 2016</span> Fixed in Apache Tomcat 
9.0.0.M3</h3>
 <div class="text">
+  
+    
+<p>
+<strong>Moderate: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763"; 
rel="nofollow">CVE-2016-0763</a>
+</p>
+
+    
+<p>
+<code>ResourceLinkFactory.setGlobalContext()</code> is a public method
+       and was accessible by web applications running under a security manager
+       without any checks. This allowed a malicious web application to inject a
+       malicious global context that could in turn be used to disrupt other web
+       applications and/or read and write data owned by other web
+       applications.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1725926";>1725926</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 18 January 2016
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 9.0.0.M1 to 9.0.0.M2</p>
+
+  
+<p>
+<i>Note: The issues below were fixed in Apache Tomcat 9.0.0.M2 but the
+       release vote for the 9.0.0.M2 release candidate did not pass. Therefore,
+       although users must download 9.0.0.M3 to obtain a version that includes
+       fixes for these issues, version 9.0.0.M2 is not included in the list of
+       affected versions.</i>
+</p>
+
+    
+<p>
+<strong>Low: Directory disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345"; 
rel="nofollow">CVE-2015-5345</a>
+</p>
+
+    
+<p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    
+<p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1715206";>1715206</a>,
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1716882";>1716882</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1716894";>1716894</a>.</p>
+
+    
+<p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+    made public on 22 February 2016.</p>
+
+    
+<p>Affects: 9.0.0.M1</p>
+
+    
+<p>
+<strong>Low: Session Fixation</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346"; 
rel="nofollow">CVE-2015-5346</a>
+</p>
+
+    
+<p>When recycling the <code>Request</code> object to use for a new request,
+    the <code>requestedSessionSSL</code> field was not recycled. This meant 
that
+    a session ID provided in the next request to be processed using the 
recycled
+    <code>Request</code> object could be used when it should not have been. 
This
+    gave the client the ability to control the session ID. In theory, this 
could
+    have been used as part of a session fixation attack but it would have been
+    hard to achieve as the attacker would not have been able to force the 
victim
+    to use the 'correct' <code>Request</code> object. It was also necessary for
+    at least one web application to be configured to use the SSL session ID as
+    the HTTP session ID. This is not a common configuration.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1713184";>1713184</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1723414";>1723414</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 22 June 2014
+       and made public on 22 February 2016.</p>
 
     
-<p>There are currently no known vulnerabilities for Apache Tomcat 9.0.x</p>
+<p>Affects: 9.0.0.M1</p>
+
+    
+<p>
+<strong>Low: CSRF token leak</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351"; 
rel="nofollow">CVE-2015-5351</a>
+</p>
+
+    
+<p>The index page of the Manager and Host Manager applications included a
+       valid CSRF token when issuing a redirect as a result of an
+       unauthenticated request to the root of the web application. This token
+       could then be used by an attacker to construct a CSRF attack.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1720652";>1720652</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1720655";>1720655</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 8 December 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 9.0.0.M1</p>
+
+    
+<p>
+<strong>Low: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706"; 
rel="nofollow">CVE-2016-0706</a>
+</p>
+
+    
+<p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1722799";>1722799</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 27 December 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 9.0.0.M1</p>
+
+    
+<p>
+<strong>Moderate: Security Manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714"; 
rel="nofollow">CVE-2016-0714</a>
+</p>
+
+    
+<p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1725263";>1725263</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1725914";>1725914</a>.</p>
+
+    
+<p>This issue was identified by the Tomcat security team on 12 November 2015
+       and made public on 22 February 2016.</p>
+
+    
+<p>Affects: 9.0.0.M1</p>
+
   
 </div>
 </div>

Modified: tomcat/site/trunk/xdocs/security-6.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Mon Feb 22 11:21:42 2016
@@ -48,6 +48,105 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 6.0.45" rtext="11 February 2016">
+
+    <p><strong>Low: Limited directory traversal</strong>
+       <cve>CVE-2015-5174</cve></p>
+
+    <p>When accessing resources via the <code>ServletContext</code> methods
+       <code>getResource()</code> <code>getResourceAsStream()</code> and
+       <code>getResourcePaths()</code> the paths should be limited to the
+       current web application. The validation was not correct and paths of the
+       form <code>"/.."</code> were not rejected. Note that paths starting with
+       <code>"/../"</code> were correctly rejected. This bug allowed malicious
+       web applications running under a security manager to obtain a directory
+       listing for the directory in which the web application had been 
deployed.
+       This should not be possible when running under a security manager.
+       Typically, the directory listing that would be exposed would be for
+       <code>$CATALINA_BASE/webapps.</code></p>
+
+    <p>This was fixed in revision <revlink rev="1700900">1700900</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 12 August 2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 6.0.0 to 6.0.44</p>
+  
+    <p><strong>Low: Directory disclosure</strong>
+       <cve>CVE-2015-5345</cve></p>
+
+    <p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    <p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    <p>This was fixed in revisions <revlink rev="1715216">1715216</revlink> and
+       <revlink rev="1717216">1717216</revlink>.</p>
+
+    <p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+       made public on 22 February 2016.</p>
+
+    <p>Affects: 6.0.0 to 6.0.44</p>
+  
+    <p><strong>Low: Security Manager bypass</strong>
+       <cve>CVE-2016-0706</cve></p>
+
+    <p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    <p>This was fixed in revision <revlink rev="1722802">1722802</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 27 December 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 6.0.0 to 6.0.44</p>
+
+    <p><strong>Moderate: Security Manager bypass</strong>
+       <cve>CVE-2016-0714</cve></p>
+
+    <p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    <p>This was fixed in revisions <revlink rev="1727166">1727166</revlink> and
+       <revlink rev="1727182">1727182</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 12 November 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 6.0.0 to 6.0.44</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 6.0.44" rtext="12 May 2015">
 
     <p><strong>Low: Denial of Service</strong>

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Mon Feb 22 11:21:42 2016
@@ -50,6 +50,174 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 7.0.68" rtext="16 February 2016">
+
+    <p><strong>Low: CSRF token leak</strong>
+       <cve>CVE-2015-5351</cve></p>
+
+    <p>The index page of the Manager and Host Manager applications included a
+       valid CSRF token when issuing a redirect as a result of an
+       unauthenticated request to the root of the web application. This token
+       could then be used by an attacker to construct a CSRF attack.</p>
+
+    <p>This was fixed in revisions <revlink rev="1720661">1720661</revlink> and
+       <revlink rev="1720663">1720663</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 8 December 2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 7.0.1 to 7.0.67</p>
+
+    <p><strong>Low: Security Manager bypass</strong>
+       <cve>CVE-2016-0706</cve></p>
+
+    <p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    <p>This was fixed in revision <revlink rev="1722801">1722801</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 27 December 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 7.0.0 to 7.0.67</p>
+
+    <p><strong>Moderate: Security Manager bypass</strong>
+       <cve>CVE-2016-0714</cve></p>
+
+    <p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    <p>This was fixed in revisions <revlink rev="1726923">1726923</revlink> and
+       <revlink rev="1727034">1727034</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 12 November 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 7.0.0 to 7.0.67</p>
+
+    <p><strong>Moderate: Security Manager bypass</strong>
+       <cve>CVE-2016-0763</cve></p>
+
+    <p><code>ResourceLinkFactory.setGlobalContext()</code> is a public method
+       and was accessible by web applications running under a security manager
+       without any checks. This allowed a malicious web application to inject a
+       malicious global context that could in turn be used to disrupt other web
+       applications and/or read and write data owned by other web
+       applications.</p>
+
+    <p>This was fixed in revision <revlink rev="1725931">1725931</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 18 January 2016
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 7.0.0 to 7.0.67</p>
+
+  </section>
+
+  <section name="Fixed in Apache Tomcat 7.0.67" rtext="10 December 2015">
+  
+    <p><strong>Low: Directory disclosure</strong>
+       <cve>CVE-2015-5345</cve></p>
+
+    <p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    <p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    <p>This was fixed in revisions <revlink rev="1715213">1715213</revlink> and
+       <revlink rev="1717212">1717212</revlink>.</p>
+
+    <p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+    made public on 22 February 2016.</p>
+
+    <p>Affects: 7.0.0 to 7.0.66</p>
+
+  <p><i>Note: The issue below was fixed in Apache Tomcat 7.0.66 but the
+       release vote for the 7.0.66 release candidate did not pass. Therefore,
+       although users must download 7.0.67 to obtain a version that includes a
+       fix for this issue, version 7.0.66 is not included in the list of
+       affected versions.</i></p>
+
+    <p><strong>Low: Session Fixation</strong>
+       <cve>CVE-2015-5346</cve></p>
+
+    <p>When recycling the <code>Request</code> object to use for a new request,
+    the <code>requestedSessionSSL</code> field was not recycled. This meant 
that
+    a session ID provided in the next request to be processed using the 
recycled
+    <code>Request</code> object could be used when it should not have been. 
This
+    gave the client the ability to control the session ID. In theory, this 
could
+    have been used as part of a session fixation attack but it would have been
+    hard to achieve as the attacker would not have been able to force the 
victim
+    to use the 'correct' <code>Request</code> object. It was also necessary for
+    at least one web application to be configured to use the SSL session ID as
+    the HTTP session ID. This is not a common configuration.</p>
+
+    <p>This was fixed in revision <revlink rev="1713187">1713187</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 22 June 2014
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 7.0.5 to 7.0.65</p>
+
+  </section>
+
+  <section name="Fixed in Apache Tomcat 7.0.65" rtext="19 October 2015">
+
+    <p><strong>Low: Limited directory traversal</strong>
+       <cve>CVE-2015-5174</cve></p>
+
+    <p>When accessing resources via the <code>ServletContext</code> methods
+       <code>getResource()</code> <code>getResourceAsStream()</code> and
+       <code>getResourcePaths()</code> the paths should be limited to the
+       current web application. The validation was not correct and paths of the
+       form <code>"/.."</code> were not rejected. Note that paths starting with
+       <code>"/../"</code> were correctly rejected. This bug allowed malicious
+       web applications running under a security manager to obtain a directory
+       listing for the directory in which the web application had been 
deployed.
+       This should not be possible when running under a security manager.
+       Typically, the directory listing that would be exposed would be for
+       <code>$CATALINA_BASE/webapps.</code></p>
+
+    <p>This was fixed in revisions <revlink rev="1696284">1696284</revlink> and
+       <revlink rev="1700898">1700898</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 12 August 2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 7.0.0 to 7.0.64</p>
+  
+  </section>
+
   <section name="Fixed in Apache Tomcat 7.0.59" rtext="4 February 2015">
 
   <p><i>Note: The issue below was fixed in Apache Tomcat 7.0.58 but the

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Mon Feb 22 11:21:42 2016
@@ -50,12 +50,181 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.0.32" rtext="8 February 2016">
+
+  <p><i>Note: The issues below were fixed in Apache Tomcat 8.0.31 but the
+       release vote for the 8.0.31 release candidate did not pass. Therefore,
+       although users must download 8.0.32 to obtain a version that includes
+       fixes for these issues, version 8.0.31 is not included in the list of
+       affected versions.</i></p>
+
+    <p><strong>Low: Session Fixation</strong>
+       <cve>CVE-2015-5346</cve></p>
+
+    <p>When recycling the <code>Request</code> object to use for a new request,
+    the <code>requestedSessionSSL</code> field was not recycled. This meant 
that
+    a session ID provided in the next request to be processed using the 
recycled
+    <code>Request</code> object could be used when it should not have been. 
This
+    gave the client the ability to control the session ID. In theory, this 
could
+    have been used as part of a session fixation attack but it would have been
+    hard to achieve as the attacker would not have been able to force the 
victim
+    to use the 'correct' <code>Request</code> object. It was also necessary for
+    at least one web application to be configured to use the SSL session ID as
+    the HTTP session ID. This is not a common configuration.</p>
+
+    <p>This was fixed in revisions <revlink rev="1713185">1713185</revlink> and
+       <revlink rev="1723506">1723506</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 22 June 2014
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    <p><strong>Low: CSRF token leak</strong>
+       <cve>CVE-2015-5351</cve></p>
+
+    <p>The index page of the Manager and Host Manager applications included a
+       valid CSRF token when issuing a redirect as a result of an
+       unauthenticated request to the root of the web application. This token
+       could then be used by an attacker to construct a CSRF attack.</p>
+
+    <p>This was fixed in revisions <revlink rev="1720658">1720658</revlink> and
+       <revlink rev="1720660">1720660</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 8 December 2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    <p><strong>Low: Security Manager bypass</strong>
+       <cve>CVE-2016-0706</cve></p>
+
+    <p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    <p>This was fixed in revision <revlink rev="1722800">1722800</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 27 December 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    <p><strong>Moderate: Security Manager bypass</strong>
+       <cve>CVE-2016-0714</cve></p>
+
+    <p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    <p>This was fixed in revisions <revlink rev="1726196">1726196</revlink> and
+       <revlink rev="1726203">1726203</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 12 November 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+    <p><strong>Moderate: Security Manager bypass</strong>
+       <cve>CVE-2016-0763</cve></p>
+
+    <p><code>ResourceLinkFactory.setGlobalContext()</code> is a public method
+       and was accessible by web applications running under a security manager
+       without any checks. This allowed a malicious web application to inject a
+       malicious global context that could in turn be used to disrupt other web
+       applications and/or read and write data owned by other web
+       applications.</p>
+
+    <p>This was fixed in revision <revlink rev="1725929">1725929</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 18 January 2016
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 8.0.0.RC1 to 8.0.30</p>
+
+  </section>
+
+  <section name="Fixed in Apache Tomcat 8.0.30" rtext="6 December 2015">
+  
+    <p><strong>Low: Directory disclosure</strong>
+       <cve>CVE-2015-5345</cve></p>
+
+    <p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    <p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    <p>This was fixed in revisions <revlink rev="1715207">1715207</revlink> and
+       <revlink rev="1717209">1717209</revlink>.</p>
+
+    <p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+    made public on 22 February 2016.</p>
+
+    <p>Affects: 8.0.0.RC1 to 8.0.29</p>
+
+  </section>
+
+  <section name="Fixed in Apache Tomcat 8.0.27" rtext="1 October 2015">
+
+    <p><strong>Low: Limited directory traversal</strong>
+       <cve>CVE-2015-5174</cve></p>
+
+    <p>When accessing resources via the <code>ServletContext</code> methods
+       <code>getResource()</code> <code>getResourceAsStream()</code> and
+       <code>getResourcePaths()</code> the paths should be limited to the
+       current web application. The validation was not correct and paths of the
+       form <code>"/.."</code> were not rejected. Note that paths starting with
+       <code>"/../"</code> were correctly rejected. This bug allowed malicious
+       web applications running under a security manager to obtain a directory
+       listing for the directory in which the web application had been 
deployed.
+       This should not be possible when running under a security manager.
+       Typically, the directory listing that would be exposed would be for
+       <code>$CATALINA_BASE/webapps.</code></p>
+
+    <p>This was fixed in revisions <revlink rev="1696281">1696281</revlink> and
+       <revlink rev="1700897">1700897</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 12 August 2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 8.0.0-RC1 to 8.0.26</p>
+  
+  </section>
+
   <section name="Fixed in Apache Tomcat 8.0.17" rtext="16 January 2015">
 
   <p><i>Note: The issue below was fixed in Apache Tomcat 8.0.16 but the
        release vote for the 8.0.16 release candidate did not pass. Therefore,
        although users must download 8.0.17 to obtain a version that includes a
-       fix for this issue, versions 8.0.16 is not included in the list of
+       fix for this issue, version 8.0.16 is not included in the list of
        affected versions.</i></p>
 
     <p><strong>Moderate: Security Manager bypass</strong>

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1731626&r1=1731625&r2=1731626&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Mon Feb 22 11:21:42 2016
@@ -50,11 +50,146 @@
 
   </section>
 
-  <section name="Fixed in Apache Tomcat 9.0.x">
+  <section name="Fixed in Apache Tomcat 9.0.0.M3" rtext="5 January 2016">
+  
+    <p><strong>Moderate: Security Manager bypass</strong>
+       <cve>CVE-2016-0763</cve></p>
+
+    <p><code>ResourceLinkFactory.setGlobalContext()</code> is a public method
+       and was accessible by web applications running under a security manager
+       without any checks. This allowed a malicious web application to inject a
+       malicious global context that could in turn be used to disrupt other web
+       applications and/or read and write data owned by other web
+       applications.</p>
+
+    <p>This was fixed in revision <revlink rev="1725926">1725926</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 18 January 2016
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.0.M2</p>
+
+  <p><i>Note: The issues below were fixed in Apache Tomcat 9.0.0.M2 but the
+       release vote for the 9.0.0.M2 release candidate did not pass. Therefore,
+       although users must download 9.0.0.M3 to obtain a version that includes
+       fixes for these issues, version 9.0.0.M2 is not included in the list of
+       affected versions.</i></p>
+
+    <p><strong>Low: Directory disclosure</strong>
+       <cve>CVE-2015-5345</cve></p>
+
+    <p>When accessing a directory protected by a security constraint with a URL
+       that did not end in a slash, Tomcat would redirect to the URL with the
+       trailing slash thereby confirming the presence of the directory before
+       processing the security constraint. It was therefore possible for a user
+       to determine if a directory existed or not, even if the user was not
+       permitted to view the directory. The issue also occurred at the root of 
a
+       web application in which case the presence of the web application was
+       confirmed, even if a user did not have access.</p>
+
+    <p>The solution was to implement the redirect in the DefaultServlet so that
+       any security constraints and/or security enforcing Filters were 
processed
+       before the redirect. The Tomcat team recognised that moving the redirect
+       could cause regressions to two new Context configuration options
+       (<code>mapperContextRootRedirectEnabled</code> and
+       <code>mapperDirectoryRedirectEnabled</code>) were introduced. The 
initial
+       default was <code>false</code> for both since this was more secure. 
+       However, due to regressions such as
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=58765";>Bug
+       58765</a> the default for <code>mapperContextRootRedirectEnabled</code>
+       was later changed to true since it was viewed that the regression was
+       more serious than the security risk of associated with being able to
+       determine if a web application was deployed at a given path.</p>
+
+    <p>This was fixed in revisions <revlink rev="1715206">1715206</revlink>,
+       <revlink rev="1716882">1716882</revlink> and
+       <revlink rev="1716894">1716894</revlink>.</p>
+
+    <p>This issue was identified by Mark Koek of QCSec on 12 October 2015 and
+    made public on 22 February 2016.</p>
+
+    <p>Affects: 9.0.0.M1</p>
+
+    <p><strong>Low: Session Fixation</strong>
+       <cve>CVE-2015-5346</cve></p>
+
+    <p>When recycling the <code>Request</code> object to use for a new request,
+    the <code>requestedSessionSSL</code> field was not recycled. This meant 
that
+    a session ID provided in the next request to be processed using the 
recycled
+    <code>Request</code> object could be used when it should not have been. 
This
+    gave the client the ability to control the session ID. In theory, this 
could
+    have been used as part of a session fixation attack but it would have been
+    hard to achieve as the attacker would not have been able to force the 
victim
+    to use the 'correct' <code>Request</code> object. It was also necessary for
+    at least one web application to be configured to use the SSL session ID as
+    the HTTP session ID. This is not a common configuration.</p>
+
+    <p>This was fixed in revisions <revlink rev="1713184">1713184</revlink> and
+       <revlink rev="1723414">1723414</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 22 June 2014
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 9.0.0.M1</p>
+
+    <p><strong>Low: CSRF token leak</strong>
+       <cve>CVE-2015-5351</cve></p>
+
+    <p>The index page of the Manager and Host Manager applications included a
+       valid CSRF token when issuing a redirect as a result of an
+       unauthenticated request to the root of the web application. This token
+       could then be used by an attacker to construct a CSRF attack.</p>
+
+    <p>This was fixed in revisions <revlink rev="1720652">1720652</revlink> and
+       <revlink rev="1720655">1720655</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 8 December 2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 9.0.0.M1</p>
+
+    <p><strong>Low: Security Manager bypass</strong>
+       <cve>CVE-2016-0706</cve></p>
+
+    <p>The StatusManagerServlet could be loaded by a web application when a
+       security manager was configured. This servlet would then provide the web
+       application with a list of all deployed applications and a list of the
+       HTTP request lines for all requests currently being processed. This 
could
+       have exposed sensitive information from other web applications such as
+       session IDs to the web application.</p>
+
+    <p>This was fixed in revision <revlink rev="1722799">1722799</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 27 December 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 9.0.0.M1</p>
+
+    <p><strong>Moderate: Security Manager bypass</strong>
+       <cve>CVE-2016-0714</cve></p>
+
+    <p>Tomcat provides several session persistence mechanisms. The
+       <code>StandardManager</code> persists session over a restart. The
+       <code>PersistentManager</code> is able to persist sessions to files, a
+       database or a custom <code>Store</code>. The cluster implementation
+       persists sessions to one or more additional nodes in the cluster. All of
+       these mechanisms could be exploited to bypass a security manager. 
Session
+       persistence is performed by Tomcat code with the permissions assigned to
+       Tomcat internal code. By placing a carefully crafted object into a
+       session, a malicious web application could trigger the execution of
+       arbitrary code.</p>
+
+    <p>This was fixed in revisions <revlink rev="1725263">1725263</revlink> and
+       <revlink rev="1725914">1725914</revlink>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 12 November 
2015
+       and made public on 22 February 2016.</p>
+
+    <p>Affects: 9.0.0.M1</p>
 
-    <p>There are currently no known vulnerabilities for Apache Tomcat 9.0.x</p>
   </section>
 
+
 </body>
 </document>
 



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to