Author: remm Date: Tue Mar 20 13:28:25 2007 New Revision: 520556 URL: http://svn.apache.org/viewvc?view=rev&rev=520556 Log: - Some additional tweaks.
Modified: tomcat/site/trunk/docs/security-4.html tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-6.html tomcat/site/trunk/xdocs/security-4.xml tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-6.xml Modified: tomcat/site/trunk/docs/security-4.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?view=diff&rev=520556&r1=520555&r2=520556 ============================================================================== --- tomcat/site/trunk/docs/security-4.html (original) +++ tomcat/site/trunk/docs/security-4.html Tue Mar 20 13:28:25 2007 @@ -246,27 +246,23 @@ CVE-2007-0450</a> </p> - <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is used + <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is used behind a proxy (including, but not limited to, Apache HTTP server with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP request containing strings like "/\../" may allow attackers to work around the context restriction of the proxy, and access the non-proxied contexts. </p> - <p>The following Java startup options have been added to Tomcat to provide - additional control of the handling of '\' and '%5c' in URLs (both options + <p>The following Java system properties have been added to Tomcat to provide + additional control of the handling of path delimiters in URLs (both options default to false): <ul> <li> -<code> - -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false - </code> -</li> + <code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: <code>true|false</code> + </li> <li> -<code> - -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false - </code> -</li> + <code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: <code>true|false</code> + </li> </ul> </p> Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?view=diff&rev=520556&r1=520555&r2=520556 ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Tue Mar 20 13:28:25 2007 @@ -269,27 +269,23 @@ CVE-2007-0450</a> </p> - <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is used + <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is used behind a proxy (including, but not limited to, Apache HTTP server with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP request containing strings like "/\../" may allow attackers to work around the context restriction of the proxy, and access the non-proxied contexts. </p> - <p>The following Java startup options have been added to Tomcat to provide - additional control of the handling of '\' and '%5c' in URLs (both options + <p>The following Java system properties have been added to Tomcat to provide + additional control of the handling of path delimiters in URLs (both options default to false): <ul> <li> -<code> - -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false - </code> -</li> + <code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: <code>true|false</code> + </li> <li> -<code> - -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false - </code> -</li> + <code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: <code>true|false</code> + </li> </ul> </p> Modified: tomcat/site/trunk/docs/security-6.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?view=diff&rev=520556&r1=520555&r2=520556 ============================================================================== --- tomcat/site/trunk/docs/security-6.html (original) +++ tomcat/site/trunk/docs/security-6.html Tue Mar 20 13:28:25 2007 @@ -269,27 +269,23 @@ CVE-2007-0450</a> </p> - <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is used + <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is used behind a proxy (including, but not limited to, Apache HTTP server with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP request containing strings like "/\../" may allow attackers to work around the context restriction of the proxy, and access the non-proxied contexts. </p> - <p>The following Java startup options have been added to Tomcat to provide - additional control of the handling of '\' and '%5c' in URLs (both options + <p>The following Java system properties have been added to Tomcat to provide + additional control of the handling of path delimiters in URLs (both options default to false): <ul> <li> -<code> - -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false - </code> -</li> + <code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: <code>true|false</code> + </li> <li> -<code> - -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false - </code> -</li> + <code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: <code>true|false</code> + </li> </ul> </p> Modified: tomcat/site/trunk/xdocs/security-4.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?view=diff&rev=520556&r1=520555&r2=520556 ============================================================================== --- tomcat/site/trunk/xdocs/security-4.xml (original) +++ tomcat/site/trunk/xdocs/security-4.xml Tue Mar 20 13:28:25 2007 @@ -46,23 +46,23 @@ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> CVE-2007-0450</a></p> - <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is used + <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is used behind a proxy (including, but not limited to, Apache HTTP server with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP request containing strings like "/\../" may allow attackers to work around the context restriction of the proxy, and access the non-proxied contexts. </p> - <p>The following Java startup options have been added to Tomcat to provide - additional control of the handling of '\' and '%5c' in URLs (both options + <p>The following Java system properties have been added to Tomcat to provide + additional control of the handling of path delimiters in URLs (both options default to false): <ul> - <li><code> - -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false - </code></li> - <li><code> - -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false - </code></li> + <li> + <code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: <code>true|false</code> + </li> + <li> + <code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: <code>true|false</code> + </li> </ul> </p> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?view=diff&rev=520556&r1=520555&r2=520556 ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Tue Mar 20 13:28:25 2007 @@ -48,23 +48,23 @@ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> CVE-2007-0450</a></p> - <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is used + <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is used behind a proxy (including, but not limited to, Apache HTTP server with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP request containing strings like "/\../" may allow attackers to work around the context restriction of the proxy, and access the non-proxied contexts. </p> - <p>The following Java startup options have been added to Tomcat to provide - additional control of the handling of '\' and '%5c' in URLs (both options + <p>The following Java system properties have been added to Tomcat to provide + additional control of the handling of path delimiters in URLs (both options default to false): <ul> - <li><code> - -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false - </code></li> - <li><code> - -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false - </code></li> + <li> + <code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: <code>true|false</code> + </li> + <li> + <code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: <code>true|false</code> + </li> </ul> </p> Modified: tomcat/site/trunk/xdocs/security-6.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?view=diff&rev=520556&r1=520555&r2=520556 ============================================================================== --- tomcat/site/trunk/xdocs/security-6.xml (original) +++ tomcat/site/trunk/xdocs/security-6.xml Tue Mar 20 13:28:25 2007 @@ -48,23 +48,23 @@ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450"> CVE-2007-0450</a></p> - <p>Tomcat permits both '\' and '%5C' as path delimiters. When Tomcat is used + <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is used behind a proxy (including, but not limited to, Apache HTTP server with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP request containing strings like "/\../" may allow attackers to work around the context restriction of the proxy, and access the non-proxied contexts. </p> - <p>The following Java startup options have been added to Tomcat to provide - additional control of the handling of '\' and '%5c' in URLs (both options + <p>The following Java system properties have been added to Tomcat to provide + additional control of the handling of path delimiters in URLs (both options default to false): <ul> - <li><code> - -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true|false - </code></li> - <li><code> - -Dorg.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH=true|false - </code></li> + <li> + <code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>: <code>true|false</code> + </li> + <li> + <code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>: <code>true|false</code> + </li> </ul> </p> --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]