Author: markt Date: Fri Mar 16 18:43:09 2007 New Revision: 519205 URL: http://svn.apache.org/viewvc?view=rev&rev=519205 Log: Add CVE-2005-2090 to security pages.
Modified: tomcat/site/trunk/docs/security-4.html tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-6.html tomcat/site/trunk/xdocs/security-4.xml tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-6.xml Modified: tomcat/site/trunk/docs/security-4.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=519205&r1=519204&r2=519205 ============================================================================== --- tomcat/site/trunk/docs/security-4.html (original) +++ tomcat/site/trunk/docs/security-4.html Fri Mar 16 18:43:09 2007 @@ -211,8 +211,8 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> -<a name="Fixed in Apache Tomcat 4.1.35"> -<strong>Fixed in Apache Tomcat 4.1.35</strong> +<a name="Fixed in Apache Tomcat 4.1.HEAD"> +<strong>Fixed in Apache Tomcat 4.1.HEAD</strong> </a> </font> </td> @@ -221,6 +221,25 @@ <td> <p> <blockquote> + <p> +<strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090"> + CVE-2005-2090</a> +</p> + + <p>Requests with multiple content-length headers should be rejected as + invalid. When multiple components (firewalls, caches, proxies and Tomcat) + process a sequence of requests where one or more requests contain + multiple content-length headers and several components accept do not + reject the request and make different decisions as to which + content-length leader to use an attacker can poision a web-cache, perform + an XSS attack and obtain senstive information from requests other then + their own. Tomcat now returns 400 for requests with multiple + content-length headers. + </p> + + <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p> + <p> <strong>important: Directory traversal</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=519205&r1=519204&r2=519205 ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Fri Mar 16 18:43:09 2007 @@ -211,6 +211,48 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 5.5.23"> +<strong>Fixed in Apache Tomcat 5.5.23</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + <p> +<strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090"> + CVE-2005-2090</a> +</p> + + <p>Requests with multiple content-length headers should be rejected as + invalid. When multiple components (firewalls, caches, proxies and Tomcat) + process a sequence of requests where one or more requests contain + multiple content-length headers and several components accept do not + reject the request and make different decisions as to which + content-length leader to use an attacker can poision a web-cache, perform + an XSS attack and obtain senstive information from requests other then + their own. Tomcat now returns 400 for requests with multiple + content-length headers. + </p> + + <p>Affects: 5.0.0-5.0.HEAD, 5.5.0-5.5.22</p> + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 5.5.22, 5.0.HEAD"> <strong>Fixed in Apache Tomcat 5.5.22, 5.0.HEAD</strong> </a> Modified: tomcat/site/trunk/docs/security-6.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?view=diff&rev=519205&r1=519204&r2=519205 ============================================================================== --- tomcat/site/trunk/docs/security-6.html (original) +++ tomcat/site/trunk/docs/security-6.html Fri Mar 16 18:43:09 2007 @@ -211,6 +211,48 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 6.0.HEAD"> +<strong>Fixed in Apache Tomcat 6.0.HEAD</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + <p> +<strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090"> + CVE-2005-2090</a> +</p> + + <p>Requests with multiple content-length headers should be rejected as + invalid. When multiple components (firewalls, caches, proxies and Tomcat) + process a sequence of requests where one or more requests contain + multiple content-length headers and several components accept do not + reject the request and make different decisions as to which + content-length leader to use an attacker can poision a web-cache, perform + an XSS attack and obtain senstive information from requests other then + their own. Tomcat now returns 400 for requests with multiple + content-length headers. + </p> + + <p>Affects: 6.0.0-6.0.10</p> + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.10"> <strong>Fixed in Apache Tomcat 6.0.10</strong> </a> Modified: tomcat/site/trunk/xdocs/security-4.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=519205&r1=519204&r2=519205 ============================================================================== --- tomcat/site/trunk/xdocs/security-4.xml (original) +++ tomcat/site/trunk/xdocs/security-4.xml Fri Mar 16 18:43:09 2007 @@ -24,7 +24,24 @@ </section> - <section name="Fixed in Apache Tomcat 4.1.35"> + <section name="Fixed in Apache Tomcat 4.1.HEAD"> + <p><strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090"> + CVE-2005-2090</a></p> + + <p>Requests with multiple content-length headers should be rejected as + invalid. When multiple components (firewalls, caches, proxies and Tomcat) + process a sequence of requests where one or more requests contain + multiple content-length headers and several components accept do not + reject the request and make different decisions as to which + content-length leader to use an attacker can poision a web-cache, perform + an XSS attack and obtain senstive information from requests other then + their own. Tomcat now returns 400 for requests with multiple + content-length headers. + </p> + + <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p> + <p><strong>important: Directory traversal</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> CVE-2007-0450</a></p> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=519205&r1=519204&r2=519205 ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Fri Mar 16 18:43:09 2007 @@ -24,6 +24,25 @@ </section> + <section name="Fixed in Apache Tomcat 5.5.23"> + <p><strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090"> + CVE-2005-2090</a></p> + + <p>Requests with multiple content-length headers should be rejected as + invalid. When multiple components (firewalls, caches, proxies and Tomcat) + process a sequence of requests where one or more requests contain + multiple content-length headers and several components accept do not + reject the request and make different decisions as to which + content-length leader to use an attacker can poision a web-cache, perform + an XSS attack and obtain senstive information from requests other then + their own. Tomcat now returns 400 for requests with multiple + content-length headers. + </p> + + <p>Affects: 5.0.0-5.0.HEAD, 5.5.0-5.5.22</p> + </section> + <section name="Fixed in Apache Tomcat 5.5.22, 5.0.HEAD"> <p><strong>important: Directory traversal</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> Modified: tomcat/site/trunk/xdocs/security-6.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?view=diff&rev=519205&r1=519204&r2=519205 ============================================================================== --- tomcat/site/trunk/xdocs/security-6.xml (original) +++ tomcat/site/trunk/xdocs/security-6.xml Fri Mar 16 18:43:09 2007 @@ -24,6 +24,25 @@ </section> + <section name="Fixed in Apache Tomcat 6.0.HEAD"> + <p><strong>important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090"> + CVE-2005-2090</a></p> + + <p>Requests with multiple content-length headers should be rejected as + invalid. When multiple components (firewalls, caches, proxies and Tomcat) + process a sequence of requests where one or more requests contain + multiple content-length headers and several components accept do not + reject the request and make different decisions as to which + content-length leader to use an attacker can poision a web-cache, perform + an XSS attack and obtain senstive information from requests other then + their own. Tomcat now returns 400 for requests with multiple + content-length headers. + </p> + + <p>Affects: 6.0.0-6.0.10</p> + </section> + <section name="Fixed in Apache Tomcat 6.0.10"> <p><strong>important: Directory traversal</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> @@ -51,6 +70,7 @@ <p>Affects: 6.0.0-6.0.9</p> </section> + </body> </document> --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]