Author: remm
Date: Tue Mar 20 08:21:10 2007
New Revision: 520427

URL: http://svn.apache.org/viewvc?view=rev&rev=520427
Log:
- Clarify the '\' security issue.

Modified:
    tomcat/site/trunk/docs/security-4.html
    tomcat/site/trunk/docs/security-5.html
    tomcat/site/trunk/docs/security-6.html
    tomcat/site/trunk/xdocs/security-4.xml
    tomcat/site/trunk/xdocs/security-5.xml
    tomcat/site/trunk/xdocs/security-6.xml

Modified: tomcat/site/trunk/docs/security-4.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=520427&r1=520426&r2=520427
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Tue Mar 20 08:21:10 2007
@@ -246,15 +246,16 @@
        CVE-2007-0450</a>
 </p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request
-       containing strings like "/\../" allow attackers to break out of the 
given
-       context. Additionally, when using Tomcat behind a proxy configured to
-       only proxy some contexts this permits access to non-proxied contexts.
-       When used behind a proxy it is recommended that Tomcat is secured as if
-       the proxy were not present.</p>
+    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+       behind a proxy (including, but not limited to, Apache HTTP server with 
+       mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
+       containing strings like "/\../" may allow attackers to work around the 
context 
+       restriction of the proxy, and access the non-proxied contexts.
+    </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide
-       additional control of the handling of '\' and '%5c' in URLs:
+    <p>The following Java startup options have been added to Tomcat to provide 
+       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+       default to false):
        <ul>
          <li>
 <code>
@@ -267,7 +268,11 @@
          </code>
 </li>
        </ul>
-       These options default to false.
+    </p>
+
+    <p>Due to the impossibility to guarantee that all URLs are handled by 
Tomcat as 
+       they are in proxy servers, Tomcat should always be secured as if no 
proxy 
+       restricting context access was used.
     </p>
 
     <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=520427&r1=520426&r2=520427
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Tue Mar 20 08:21:10 2007
@@ -269,15 +269,16 @@
        CVE-2007-0450</a>
 </p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request
-       containing strings like "/\../" allow attackers to break out of the 
given
-       context. Additionally, when using Tomcat behind a proxy configured to
-       only proxy some contexts this permits access to non-proxied contexts.
-       When used behind a proxy it is recommended that Tomcat is secured as if
-       the proxy were not present.</p>
+    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+       behind a proxy (including, but not limited to, Apache HTTP server with 
+       mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
+       containing strings like "/\../" may allow attackers to work around the 
context 
+       restriction of the proxy, and access the non-proxied contexts.
+    </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide
-       additional control of the handling of '\' and '%5c' in URLs:
+    <p>The following Java startup options have been added to Tomcat to provide 
+       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+       default to false):
        <ul>
          <li>
 <code>
@@ -290,7 +291,11 @@
          </code>
 </li>
        </ul>
-       These options default to false.
+    </p>
+
+    <p>Due to the impossibility to guarantee that all URLs are handled by 
Tomcat as 
+       they are in proxy servers, Tomcat should always be secured as if no 
proxy 
+       restricting context access was used.
     </p>
 
     <p>Affects: 5.5.0-5.5.21, 5.0.0-5.0.30</p>

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?view=diff&rev=520427&r1=520426&r2=520427
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Tue Mar 20 08:21:10 2007
@@ -269,15 +269,16 @@
        CVE-2007-0450</a>
 </p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request
-       containing strings like "/\../" allow attackers to break out of the 
given
-       context. Additionally, when using Tomcat behind a proxy configured to
-       only proxy some contexts this permits access to non-proxied contexts.
-       When used behind a proxy it is recommended that Tomcat is secured as if
-       the proxy were not present.</p>
+    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+       behind a proxy (including, but not limited to, Apache HTTP server with 
+       mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
+       containing strings like "/\../" may allow attackers to work around the 
context 
+       restriction of the proxy, and access the non-proxied contexts.
+    </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide
-       additional control of the handling of '\' and '%5c' in URLs:
+    <p>The following Java startup options have been added to Tomcat to provide 
+       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+       default to false):
        <ul>
          <li>
 <code>
@@ -290,7 +291,11 @@
          </code>
 </li>
        </ul>
-       These options default to false.
+    </p>
+
+    <p>Due to the impossibility to guarantee that all URLs are handled by 
Tomcat as 
+       they are in proxy servers, Tomcat should always be secured as if no 
proxy 
+       restricting context access was used.
     </p>
 
     <p>Affects: 6.0.0-6.0.9</p>

Modified: tomcat/site/trunk/xdocs/security-4.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=520427&r1=520426&r2=520427
==============================================================================
--- tomcat/site/trunk/xdocs/security-4.xml (original)
+++ tomcat/site/trunk/xdocs/security-4.xml Tue Mar 20 08:21:10 2007
@@ -46,15 +46,16 @@
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450";>
        CVE-2007-0450</a></p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request
-       containing strings like "/\../" allow attackers to break out of the 
given
-       context. Additionally, when using Tomcat behind a proxy configured to
-       only proxy some contexts this permits access to non-proxied contexts.
-       When used behind a proxy it is recommended that Tomcat is secured as if
-       the proxy were not present.</p>
+    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+       behind a proxy (including, but not limited to, Apache HTTP server with 
+       mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
+       containing strings like "/\../" may allow attackers to work around the 
context 
+       restriction of the proxy, and access the non-proxied contexts.
+    </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide
-       additional control of the handling of '\' and '%5c' in URLs:
+    <p>The following Java startup options have been added to Tomcat to provide 
+       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+       default to false):
        <ul>
          <li><code>
            -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
@@ -63,7 +64,11 @@
            
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
          </code></li>
        </ul>
-       These options default to false.
+    </p>
+
+    <p>Due to the impossibility to guarantee that all URLs are handled by 
Tomcat as 
+       they are in proxy servers, Tomcat should always be secured as if no 
proxy 
+       restricting context access was used.
     </p>
 
     <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=520427&r1=520426&r2=520427
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Tue Mar 20 08:21:10 2007
@@ -48,15 +48,16 @@
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450";>
        CVE-2007-0450</a></p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request
-       containing strings like "/\../" allow attackers to break out of the 
given
-       context. Additionally, when using Tomcat behind a proxy configured to
-       only proxy some contexts this permits access to non-proxied contexts.
-       When used behind a proxy it is recommended that Tomcat is secured as if
-       the proxy were not present.</p>
+    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+       behind a proxy (including, but not limited to, Apache HTTP server with 
+       mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
+       containing strings like "/\../" may allow attackers to work around the 
context 
+       restriction of the proxy, and access the non-proxied contexts.
+    </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide
-       additional control of the handling of '\' and '%5c' in URLs:
+    <p>The following Java startup options have been added to Tomcat to provide 
+       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+       default to false):
        <ul>
          <li><code>
            -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
@@ -65,7 +66,11 @@
            
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
          </code></li>
        </ul>
-       These options default to false.
+    </p>
+
+    <p>Due to the impossibility to guarantee that all URLs are handled by 
Tomcat as 
+       they are in proxy servers, Tomcat should always be secured as if no 
proxy 
+       restricting context access was used.
     </p>
 
     <p>Affects: 5.5.0-5.5.21, 5.0.0-5.0.30</p>

Modified: tomcat/site/trunk/xdocs/security-6.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?view=diff&rev=520427&r1=520426&r2=520427
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Tue Mar 20 08:21:10 2007
@@ -48,15 +48,16 @@
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450";>
        CVE-2007-0450</a></p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. A HTTP request
-       containing strings like "/\../" allow attackers to break out of the 
given
-       context. Additionally, when using Tomcat behind a proxy configured to
-       only proxy some contexts this permits access to non-proxied contexts.
-       When used behind a proxy it is recommended that Tomcat is secured as if
-       the proxy were not present.</p>
+    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+       behind a proxy (including, but not limited to, Apache HTTP server with 
+       mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
+       containing strings like "/\../" may allow attackers to work around the 
context 
+       restriction of the proxy, and access the non-proxied contexts.
+    </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide
-       additional control of the handling of '\' and '%5c' in URLs:
+    <p>The following Java startup options have been added to Tomcat to provide 
+       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+       default to false):
        <ul>
          <li><code>
            -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
@@ -65,7 +66,11 @@
            
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
          </code></li>
        </ul>
-       These options default to false.
+    </p>
+
+    <p>Due to the impossibility to guarantee that all URLs are handled by 
Tomcat as 
+       they are in proxy servers, Tomcat should always be secured as if no 
proxy 
+       restricting context access was used.
     </p>
 
     <p>Affects: 6.0.0-6.0.9</p>



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to