https://bz.apache.org/bugzilla/show_bug.cgi?id=62582

--- Comment #6 from Christopher Schultz <ch...@christopherschultz.net> ---
(In reply to ABakerIII from comment #3)
> Mark Thomas : I have seen several yr old, known vulnerabilities in many open
> source projects.  Many of those could be detected by OWASP D.C. and culled.
> I have seen new exploitation mechanisms be used that finds newly discovered
> vulnerabilities in old-legacy jars.

Feel free to run this against Tomcat and report any results you find.

> Christopher Schultz :  On frequency of running the report. It depends on the
> rate of change of the project(how many new libaries are added per
> week/month), and the rate of new vulnerability discovery in the set of
> existing libraries per week/month to deternine how often the report should
> be run, and read.  In new systems, when 5-10 libs are being added daily, the
> report should be run nightly. In Tomcat ???  start with weekly ?  If after a
> while there are more than four weeks that go by without a true positive,
> perhaps monthly is OK.

The library turnover in Tomcat is ... exceedingly low.

> IMO, its a falicy to complain about a small performance hit once per week
> compared to the number of instances of sites that get broken into, PII
> stolen, money stolen, other nefaurious that bad actors could do.  Its a far
> away issue until it happens to you or someone close to you.  Also it is
> common for these open source systems to be used in critical infrastructure,
> banking, gov, military. A once weekly performance penalty is a small price.

Okay, let's see.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to