Author: markt
Date: Tue Jun  6 10:21:52 2017
New Revision: 1797770

URL: http://svn.apache.org/viewvc?rev=1797770&view=rev
Log:
Add CVE-2017-5664

Modified:
    tomcat/site/trunk/docs/security-7.html
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-7.xml
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Tue Jun  6 10:21:52 2017
@@ -227,6 +227,9 @@
 <a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_7.0.78">Fixed in Apache Tomcat 7.0.78</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_7.0.77">Fixed in Apache Tomcat 7.0.77</a>
 </li>
 <li>
@@ -380,6 +383,64 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_7.0.78">
+<span style="float: right;">16 May 2017</span> Fixed in Apache Tomcat 
7.0.78</h3>
+<div class="text">
+  
+    
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"; 
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+    
+<p>The error page mechanism of the Java Servlet Specification requires that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   
+<p>If the error page is a static file, expected behaviour is to serve content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    
+<p>Notes for other user provided error pages:</p>
+    
+<ul>
+      
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      
+<li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    
+</ul>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793471";>1793471</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793491";>1793491</a>.</p>
+
+    
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    
+<p>Affects: 7.0.0 to 7.0.77</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_7.0.77">
 <span style="float: right;">2 April 2017</span> Fixed in Apache Tomcat 
7.0.77</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Tue Jun  6 10:21:52 2017
@@ -227,6 +227,12 @@
 <a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache Tomcat 8.0.44</a>
+</li>
+<li>
+<a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache Tomcat 8.5.15</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a>
 </li>
 <li>
@@ -341,6 +347,122 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_8.0.44">
+<span style="float: right;">16 May 2017</span> Fixed in Apache Tomcat 
8.0.44</h3>
+<div class="text">
+  
+    
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"; 
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+    
+<p>The error page mechanism of the Java Servlet Specification requires that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   
+<p>If the error page is a static file, expected behaviour is to serve content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    
+<p>Notes for other user provided error pages:</p>
+    
+<ul>
+      
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      
+<li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    
+</ul>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793470";>1793470</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793489";>1793489</a>.</p>
+
+    
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    
+<p>Affects: 8.0.0.RC1 to 8.0.43</p>
+
+  
+</div>
+<h3 id="Fixed_in_Apache_Tomcat_8.5.15">
+<span style="float: right;">10 May 2017</span> Fixed in Apache Tomcat 
8.5.15</h3>
+<div class="text">
+  
+    
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"; 
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+    
+<p>The error page mechanism of the Java Servlet Specification requires that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   
+<p>If the error page is a static file, expected behaviour is to serve content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    
+<p>Notes for other user provided error pages:</p>
+    
+<ul>
+      
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      
+<li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    
+</ul>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793469";>1793469</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793488";>1793488</a>.</p>
+
+    
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    
+<p>Affects: 8.5.0 to 8.5.14</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_8.0.43">
 <span style="float: right;">2 April 2017</span> Fixed in Apache Tomcat 
8.0.43</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Tue Jun  6 10:21:52 2017
@@ -227,6 +227,9 @@
 <a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 
9.0.0.M21</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a>
 </li>
 <li>
@@ -299,6 +302,64 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_9.0.0.M21">
+<span style="float: right;">10 May 2017</span> Fixed in Apache Tomcat 
9.0.0.M21</h3>
+<div class="text">
+  
+    
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"; 
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+    
+<p>The error page mechanism of the Java Servlet Specification requires that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   
+<p>If the error page is a static file, expected behaviour is to serve content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    
+<p>Notes for other user provided error pages:</p>
+    
+<ul>
+      
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      
+<li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    
+</ul>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793468";>1793468</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1793487";>1793487</a>.</p>
+
+    
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    
+<p>Affects: 9.0.0.M1 to 9.0.0.M20</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_9.0.0.M19">
 <span style="float: right;">30 March 2017</span> Fixed in Apache Tomcat 
9.0.0.M19</h3>
 <div class="text">

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Tue Jun  6 10:21:52 2017
@@ -50,6 +50,49 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 7.0.78" rtext="16 May 2017">
+  
+    <p><strong>Important: Security Constraint Bypass</strong>
+       <cve>CVE-2017-5664</cve></p>
+
+    <p>The error page mechanism of the Java Servlet Specification requires 
that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   <p>If the error page is a static file, expected behaviour is to serve 
content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    <p>Notes for other user provided error pages:</p>
+    <ul>
+      <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      <li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    </ul>
+
+    <p>This was fixed in revisions <revlink rev="1793471">1793471</revlink> and
+       <revlink rev="1793491">1793491</revlink>.</p>
+
+    <p>This issue was reported responsibly to the Apache Tomcat Security Team 
by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    <p>Affects: 7.0.0 to 7.0.77</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 7.0.77" rtext="2 April 2017">
 
   <p><strong>Important: Information Disclosure</strong>

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Tue Jun  6 10:21:52 2017
@@ -50,6 +50,92 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.0.44" rtext="16 May 2017">
+  
+    <p><strong>Important: Security Constraint Bypass</strong>
+       <cve>CVE-2017-5664</cve></p>
+
+    <p>The error page mechanism of the Java Servlet Specification requires 
that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   <p>If the error page is a static file, expected behaviour is to serve 
content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    <p>Notes for other user provided error pages:</p>
+    <ul>
+      <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      <li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    </ul>
+
+    <p>This was fixed in revisions <revlink rev="1793470">1793470</revlink> and
+       <revlink rev="1793489">1793489</revlink>.</p>
+
+    <p>This issue was reported responsibly to the Apache Tomcat Security Team 
by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    <p>Affects: 8.0.0.RC1 to 8.0.43</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 8.5.15" rtext="10 May 2017">
+  
+    <p><strong>Important: Security Constraint Bypass</strong>
+       <cve>CVE-2017-5664</cve></p>
+
+    <p>The error page mechanism of the Java Servlet Specification requires 
that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   <p>If the error page is a static file, expected behaviour is to serve 
content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    <p>Notes for other user provided error pages:</p>
+    <ul>
+      <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      <li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    </ul>
+
+    <p>This was fixed in revisions <revlink rev="1793469">1793469</revlink> and
+       <revlink rev="1793488">1793488</revlink>.</p>
+
+    <p>This issue was reported responsibly to the Apache Tomcat Security Team 
by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    <p>Affects: 8.5.0 to 8.5.14</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 8.0.43" rtext="2 April 2017">
 
   <p><strong>Important: Information Disclosure</strong>

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Tue Jun  6 10:21:52 2017
@@ -50,6 +50,49 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.0.M21" rtext="10 May 2017">
+  
+    <p><strong>Important: Security Constraint Bypass</strong>
+       <cve>CVE-2017-5664</cve></p>
+
+    <p>The error page mechanism of the Java Servlet Specification requires 
that,
+       when an error occurs and an error page is configured for the error that
+       occurred, the original request and response are forwarded to the error
+       page. This means that the request is presented to the error page with 
the
+       original HTTP method.</p>
+
+   <p>If the error page is a static file, expected behaviour is to serve 
content
+      of the file as if processing a GET request, regardless of the actual HTT
+      method. Tomcat's Default Servlet did not do this. Depending on the
+      original request this could lead to unexpected and undesirable results 
for
+      static error pages including, if the DefaultServlet is configured to
+      permit writes, the replacement or removal of the custom error page.</p>
+
+    <p>Notes for other user provided error pages:</p>
+    <ul>
+      <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+          JSPs used as error pages must must ensure that they handle any error
+          dispatch as a GET request, regardless of the actual method.</li>
+      <li>By default, the response generated by a Servlet does depend on the
+          HTTP method. Custom Servlets used as error pages must ensure that
+          they handle any error dispatch as a GET request, regardless of the
+          actual method.</li>
+    </ul>
+
+    <p>This was fixed in revisions <revlink rev="1793468">1793468</revlink> and
+       <revlink rev="1793487">1793487</revlink>.</p>
+
+    <p>This issue was reported responsibly to the Apache Tomcat Security Team 
by
+       Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+       India as a vulnerability that allowed the restrictions on OPTIONS and
+       TRACE requests to be bypassed on 21 April 2017. The full implications of
+       this issue were identified by the Tomcat Security Team on 24 April 2017.
+       This issue was made public on 6 June 2017.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.0.M20</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 9.0.0.M19" rtext="30 March 2017">
 
     <p><strong>Important: Information Disclosure</strong>



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to