https://issues.apache.org/bugzilla/show_bug.cgi?id=48559

Mark Thomas <ma...@apache.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID

--- Comment #1 from Mark Thomas <ma...@apache.org> 2010-01-17 10:18:30 GMT ---
The fix for CVE-2007-5333 essentially made Tomcat apply the various cookie
specifications more strictly. Where we can safely do so, options have been
added to reduce the strictness of these checks.

The '=' characters that can appear in base64 data will cause the quoting. A new
option will be included in the next 6.0.x release that allows = to be used
without the quotes being added. This may help.

The quotes should be transparent to applications that set and read cookie
values through the Servlet API. If they are not, that is probably a bug in
Tomcat.

Applications that read and set cookies directly should be able to handle
specification compliant cookies. If they cannot, that is probably a bug in
those applications.

Depending on circumstances, one option may be to bypass the Servlet API and
set/read the cookie headers directly. Again, applications that do this should
be specification compliant, although they can break the specs at their own
risk.

If you need assistance with a specific case, please ask - with examples - on
the Tomcat users mailing list.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to