Author: remm
Date: Tue Mar 20 13:28:25 2007
New Revision: 520556

URL: http://svn.apache.org/viewvc?view=rev&rev=520556
Log:
- Some additional tweaks.

Modified:
    tomcat/site/trunk/docs/security-4.html
    tomcat/site/trunk/docs/security-5.html
    tomcat/site/trunk/docs/security-6.html
    tomcat/site/trunk/xdocs/security-4.xml
    tomcat/site/trunk/xdocs/security-5.xml
    tomcat/site/trunk/xdocs/security-6.xml

Modified: tomcat/site/trunk/docs/security-4.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=520556&r1=520555&r2=520556
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Tue Mar 20 13:28:25 2007
@@ -246,27 +246,23 @@
        CVE-2007-0450</a>
 </p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+    <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is 
used 
        behind a proxy (including, but not limited to, Apache HTTP server with 
        mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
        containing strings like "/\../" may allow attackers to work around the 
context 
        restriction of the proxy, and access the non-proxied contexts.
     </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide 
-       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+    <p>The following Java system properties have been added to Tomcat to 
provide 
+       additional control of the handling of path delimiters in URLs (both 
options 
        default to false):
        <ul>
          <li>
-<code>
-           -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
-         </code>
-</li>
+           
<code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: 
<code>true|false</code>
+         </li>
          <li>
-<code>
-           
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
-         </code>
-</li>
+           
<code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: 
<code>true|false</code>
+         </li>
        </ul>
     </p>
 

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=520556&r1=520555&r2=520556
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Tue Mar 20 13:28:25 2007
@@ -269,27 +269,23 @@
        CVE-2007-0450</a>
 </p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+    <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is 
used 
        behind a proxy (including, but not limited to, Apache HTTP server with 
        mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
        containing strings like "/\../" may allow attackers to work around the 
context 
        restriction of the proxy, and access the non-proxied contexts.
     </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide 
-       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+    <p>The following Java system properties have been added to Tomcat to 
provide 
+       additional control of the handling of path delimiters in URLs (both 
options 
        default to false):
        <ul>
          <li>
-<code>
-           -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
-         </code>
-</li>
+           
<code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: 
<code>true|false</code>
+         </li>
          <li>
-<code>
-           
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
-         </code>
-</li>
+           
<code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: 
<code>true|false</code>
+         </li>
        </ul>
     </p>
 

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?view=diff&rev=520556&r1=520555&r2=520556
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Tue Mar 20 13:28:25 2007
@@ -269,27 +269,23 @@
        CVE-2007-0450</a>
 </p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+    <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is 
used 
        behind a proxy (including, but not limited to, Apache HTTP server with 
        mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
        containing strings like "/\../" may allow attackers to work around the 
context 
        restriction of the proxy, and access the non-proxied contexts.
     </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide 
-       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+    <p>The following Java system properties have been added to Tomcat to 
provide 
+       additional control of the handling of path delimiters in URLs (both 
options 
        default to false):
        <ul>
          <li>
-<code>
-           -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
-         </code>
-</li>
+           
<code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: 
<code>true|false</code>
+         </li>
          <li>
-<code>
-           
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
-         </code>
-</li>
+           
<code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: 
<code>true|false</code>
+         </li>
        </ul>
     </p>
 

Modified: tomcat/site/trunk/xdocs/security-4.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=520556&r1=520555&r2=520556
==============================================================================
--- tomcat/site/trunk/xdocs/security-4.xml (original)
+++ tomcat/site/trunk/xdocs/security-4.xml Tue Mar 20 13:28:25 2007
@@ -46,23 +46,23 @@
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450";>
        CVE-2007-0450</a></p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+    <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is 
used 
        behind a proxy (including, but not limited to, Apache HTTP server with 
        mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
        containing strings like "/\../" may allow attackers to work around the 
context 
        restriction of the proxy, and access the non-proxied contexts.
     </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide 
-       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+    <p>The following Java system properties have been added to Tomcat to 
provide 
+       additional control of the handling of path delimiters in URLs (both 
options 
        default to false):
        <ul>
-         <li><code>
-           -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
-         </code></li>
-         <li><code>
-           
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
-         </code></li>
+         <li>
+           
<code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: 
<code>true|false</code>
+         </li>
+         <li>
+           
<code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: 
<code>true|false</code>
+         </li>
        </ul>
     </p>
 

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=520556&r1=520555&r2=520556
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Tue Mar 20 13:28:25 2007
@@ -48,23 +48,23 @@
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450";>
        CVE-2007-0450</a></p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+    <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is 
used 
        behind a proxy (including, but not limited to, Apache HTTP server with 
        mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
        containing strings like "/\../" may allow attackers to work around the 
context 
        restriction of the proxy, and access the non-proxied contexts.
     </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide 
-       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+    <p>The following Java system properties have been added to Tomcat to 
provide 
+       additional control of the handling of path delimiters in URLs (both 
options 
        default to false):
        <ul>
-         <li><code>
-           -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
-         </code></li>
-         <li><code>
-           
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
-         </code></li>
+         <li>
+           
<code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: 
<code>true|false</code>
+         </li>
+         <li>
+           
<code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: 
<code>true|false</code>
+         </li>
        </ul>
     </p>
 

Modified: tomcat/site/trunk/xdocs/security-6.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?view=diff&rev=520556&r1=520555&r2=520556
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Tue Mar 20 13:28:25 2007
@@ -48,23 +48,23 @@
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450";>
        CVE-2007-0450</a></p>
 
-    <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is 
used 
+    <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is 
used 
        behind a proxy (including, but not limited to, Apache HTTP server with 
        mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP 
request 
        containing strings like "/\../" may allow attackers to work around the 
context 
        restriction of the proxy, and access the non-proxied contexts.
     </p>
 
-    <p>The following Java startup options have been added to Tomcat to provide 
-       additional control of the handling of '\' and '%5c' in URLs (both 
options 
+    <p>The following Java system properties have been added to Tomcat to 
provide 
+       additional control of the handling of path delimiters in URLs (both 
options 
        default to false):
        <ul>
-         <li><code>
-           -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false
-         </code></li>
-         <li><code>
-           
-Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false
-         </code></li>
+         <li>
+           
<code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: 
<code>true|false</code>
+         </li>
+         <li>
+           
<code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: 
<code>true|false</code>
+         </li>
        </ul>
     </p>
 



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to