Author: markt Date: Fri Mar 16 18:07:15 2007 New Revision: 519197 URL: http://svn.apache.org/viewvc?view=rev&rev=519197 Log: Add CVE-2007-0450 to security pages.
Modified: tomcat/site/trunk/docs/security-4.html tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-6.html tomcat/site/trunk/docs/security.html tomcat/site/trunk/xdocs/security-4.xml tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-6.xml tomcat/site/trunk/xdocs/security.xml Modified: tomcat/site/trunk/docs/security-4.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/docs/security-4.html (original) +++ tomcat/site/trunk/docs/security-4.html Fri Mar 16 18:07:15 2007 @@ -211,6 +211,61 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 4.1.35"> +<strong>Fixed in Apache Tomcat 4.1.35</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + <p> +<strong>important: Directory traversal</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> + CVE-2007-0450</a> +</p> + + <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request + containing strings like "/\../" allow attackers to break out of the given + context. Additionally, when using Tomcat behind a proxy configured to + only proxy some contexts this permits access to non-proxied contexts. + When used behind a proxy it is recommended that Tomcat is secured as if + the proxy were not present.</p> + + <p>The following Java startup options have been added to Tomcat to provide + additional control of the handling of '\' and '%5c' in URLs: + <ul> + <li> +<code> + -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false + </code> +</li> + <li> +<code> + -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false + </code> +</li> + </ul> + These options default to false. + </p> + + <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p> + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 4.1.32"> <strong>Fixed in Apache Tomcat 4.1.32</strong> </a> Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Fri Mar 16 18:07:15 2007 @@ -211,6 +211,61 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 5.5.22, 5.0.HEAD"> +<strong>Fixed in Apache Tomcat 5.5.22, 5.0.HEAD</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + <p> +<strong>important: Directory traversal</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> + CVE-2007-0450</a> +</p> + + <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request + containing strings like "/\../" allow attackers to break out of the given + context. Additionally, when using Tomcat behind a proxy configured to + only proxy some contexts this permits access to non-proxied contexts. + When used behind a proxy it is recommended that Tomcat is secured as if + the proxy were not present.</p> + + <p>The following Java startup options have been added to Tomcat to provide + additional control of the handling of '\' and '%5c' in URLs: + <ul> + <li> +<code> + -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false + </code> +</li> + <li> +<code> + -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false + </code> +</li> + </ul> + These options default to false. + </p> + + <p>Affects: 5.5.0-5.5.21, 5.0.0-5.0.30</p> + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 5.5.13, 5.0.HEAD"> <strong>Fixed in Apache Tomcat 5.5.13, 5.0.HEAD</strong> </a> Modified: tomcat/site/trunk/docs/security-6.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/docs/security-6.html (original) +++ tomcat/site/trunk/docs/security-6.html Fri Mar 16 18:07:15 2007 @@ -211,8 +211,8 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> -<a name="Fixed in Apache Tomcat 6.?.?"> -<strong>Fixed in Apache Tomcat 6.?.?</strong> +<a name="Fixed in Apache Tomcat 6.0.10"> +<strong>Fixed in Apache Tomcat 6.0.10</strong> </a> </font> </td> @@ -221,7 +221,37 @@ <td> <p> <blockquote> + <p> +<strong>important: Directory traversal</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> + CVE-2007-0450</a> +</p> + <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request + containing strings like "/\../" allow attackers to break out of the given + context. Additionally, when using Tomcat behind a proxy configured to + only proxy some contexts this permits access to non-proxied contexts. + When used behind a proxy it is recommended that Tomcat is secured as if + the proxy were not present.</p> + + <p>The following Java startup options have been added to Tomcat to provide + additional control of the handling of '\' and '%5c' in URLs: + <ul> + <li> +<code> + -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false + </code> +</li> + <li> +<code> + -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false + </code> +</li> + </ul> + These options default to false. + </p> + + <p>Affects: 6.0.0-6.0.9</p> </blockquote> </p> </td> Modified: tomcat/site/trunk/docs/security.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security.html?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/docs/security.html (original) +++ tomcat/site/trunk/docs/security.html Fri Mar 16 18:07:15 2007 @@ -184,8 +184,13 @@ <td> <p> <blockquote> - <p>These pages are a work in progress. Additional information will be added - as it is identified.</p> + + <p> +<strong>These pages are a work in progress.</strong> The intention is to + add most recently dislcosed vulnerabilitites first and then work + backwards in time. Please bear this in mind before reporting an + omission.</p> + <p>Lists of security problems fixed in released versions of Apache Tomcat are available:</p> <ul> @@ -257,6 +262,35 @@ URL repeatedly). In general our philosophy is to avoid any attacks which can cause the server to consume resources in a non-linear relationship to the size of inputs.</p> + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Errors and omissions"> +<strong>Errors and omissions</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + + <p>Please report any errors or omissions to + <a href="mailto:[EMAIL PROTECTED]">[EMAIL PROTECTED] + </a>. + </p> </blockquote> </p> Modified: tomcat/site/trunk/xdocs/security-4.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/xdocs/security-4.xml (original) +++ tomcat/site/trunk/xdocs/security-4.xml Fri Mar 16 18:07:15 2007 @@ -24,6 +24,34 @@ </section> + <section name="Fixed in Apache Tomcat 4.1.35"> + <p><strong>important: Directory traversal</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> + CVE-2007-0450</a></p> + + <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request + containing strings like "/\../" allow attackers to break out of the given + context. Additionally, when using Tomcat behind a proxy configured to + only proxy some contexts this permits access to non-proxied contexts. + When used behind a proxy it is recommended that Tomcat is secured as if + the proxy were not present.</p> + + <p>The following Java startup options have been added to Tomcat to provide + additional control of the handling of '\' and '%5c' in URLs: + <ul> + <li><code> + -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false + </code></li> + <li><code> + -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false + </code></li> + </ul> + These options default to false. + </p> + + <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p> + </section> + <section name="Fixed in Apache Tomcat 4.1.32"> <p><strong>low: Directory listing</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835"> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Fri Mar 16 18:07:15 2007 @@ -24,6 +24,34 @@ </section> + <section name="Fixed in Apache Tomcat 5.5.22, 5.0.HEAD"> + <p><strong>important: Directory traversal</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> + CVE-2007-0450</a></p> + + <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request + containing strings like "/\../" allow attackers to break out of the given + context. Additionally, when using Tomcat behind a proxy configured to + only proxy some contexts this permits access to non-proxied contexts. + When used behind a proxy it is recommended that Tomcat is secured as if + the proxy were not present.</p> + + <p>The following Java startup options have been added to Tomcat to provide + additional control of the handling of '\' and '%5c' in URLs: + <ul> + <li><code> + -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false + </code></li> + <li><code> + -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false + </code></li> + </ul> + These options default to false. + </p> + + <p>Affects: 5.5.0-5.5.21, 5.0.0-5.0.30</p> + </section> + <section name="Fixed in Apache Tomcat 5.5.13, 5.0.HEAD"> <p><strong>low: Directory listing</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835"> Modified: tomcat/site/trunk/xdocs/security-6.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/xdocs/security-6.xml (original) +++ tomcat/site/trunk/xdocs/security-6.xml Fri Mar 16 18:07:15 2007 @@ -24,8 +24,32 @@ </section> - <section name="Fixed in Apache Tomcat 6.?.?"> + <section name="Fixed in Apache Tomcat 6.0.10"> + <p><strong>important: Directory traversal</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> + CVE-2007-0450</a></p> + <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request + containing strings like "/\../" allow attackers to break out of the given + context. Additionally, when using Tomcat behind a proxy configured to + only proxy some contexts this permits access to non-proxied contexts. + When used behind a proxy it is recommended that Tomcat is secured as if + the proxy were not present.</p> + + <p>The following Java startup options have been added to Tomcat to provide + additional control of the handling of '\' and '%5c' in URLs: + <ul> + <li><code> + -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false + </code></li> + <li><code> + -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false + </code></li> + </ul> + These options default to false. + </p> + + <p>Affects: 6.0.0-6.0.9</p> </section> </body> </document> Modified: tomcat/site/trunk/xdocs/security.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security.xml?view=diff&rev=519197&r1=519196&r2=519197 ============================================================================== --- tomcat/site/trunk/xdocs/security.xml (original) +++ tomcat/site/trunk/xdocs/security.xml Fri Mar 16 18:07:15 2007 @@ -8,8 +8,12 @@ <body> <section name="Security Updates"> - <p>These pages are a work in progress. Additional information will be added - as it is identified.</p> + + <p><strong>These pages are a work in progress.</strong> The intention is to + add most recently dislcosed vulnerabilitites first and then work + backwards in time. Please bear this in mind before reporting an + omission.</p> + <p>Lists of security problems fixed in released versions of Apache Tomcat are available:</p> <ul> @@ -47,6 +51,14 @@ URL repeatedly). In general our philosophy is to avoid any attacks which can cause the server to consume resources in a non-linear relationship to the size of inputs.</p> + </section> + + <section name="Errors and omissions"> + + <p>Please report any errors or omissions to + <a href="mailto:[EMAIL PROTECTED]">[EMAIL PROTECTED] + </a>. + </p> </section> </body> --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]