Author: markt Date: Sun Jan 24 21:51:32 2010 New Revision: 902653 URL: http://svn.apache.org/viewvc?rev=902653&view=rev Log: Update for CVE-2009-2693, CVE-2009-2901 and CVE-2009-2902.
Modified: tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-6.html tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-6.xml Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=902653&r1=902652&r2=902653&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Sun Jan 24 21:51:32 2010 @@ -262,6 +262,91 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in subversion for Apache Tomcat 5.5.x"> +<strong>Fixed in subversion for Apache Tomcat 5.5.x</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + + <p> +<i>Note: These issues will be fixed in 5.5.29 but that version has not yet + been released.</i> +</p> + + <p> +<strong>Low: Arbitrary file deletion and/or alteration on deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693"> + CVE-2009-2693</a> +</p> + + <p>When deploying WAR files, the WAR files were not checked for directory + traversal attempts. This allows an attacker to create arbitrary content + outside of the web root by including entries such as + <code>../../bin/catalina.sh</code> in the WAR.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=902650&view=rev"> + revision 902650</a>.</p> + + <p>Affects: 5.5.0-5.5.28</p> + + <p> +<strong>Low: Insecure partial deploy after failed deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901"> + CVE-2009-2901</a> +</p> + + <p>By default, Tomcat automatically deploys any directories placed in a + host's appBase. This behaviour is controlled by the autoDeploy attribute + of a host which defaults to true. After a failed undeploy, the remaining + files will be deployed as a result of the autodeployment process. + Depending on circumstances, files normally protected by one or more + security constraints may be deployed without those security constraints, + making them accessible without authentication.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=902650&view=rev"> + revision 902650</a>.</p> + + <p>Affects: 5.5.0-5.5.28</p> + + <p> +<strong>Low: Unexpected file deletion in work directory</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902"> + CVE-2009-2902</a> +</p> + + <p>When deploying WAR files, the WAR file names were not checked for + directory traversal attempts. For example, deploying and undeploying + <code>...war</code> allows an attacker to cause the deletion of the + current contents of the host's work directory which may cause problems + for currently running applications.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=902650&view=rev"> + revision 902650</a>.</p> + + <p>Affects: 5.5.0-5.5.28</p> + + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 5.5.28"> <strong>Fixed in Apache Tomcat 5.5.28</strong> </a> Modified: tomcat/site/trunk/docs/security-6.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=902653&r1=902652&r2=902653&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-6.html (original) +++ tomcat/site/trunk/docs/security-6.html Sun Jan 24 21:51:32 2010 @@ -212,8 +212,8 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> -<a name="Not fixed in Apache Tomcat 6.0.x"> -<strong>Not fixed in Apache Tomcat 6.0.x</strong> +<a name="Fixed in Apache Tomcat 6.0.24"> +<strong>Fixed in Apache Tomcat 6.0.24</strong> </a> </font> </td> @@ -222,13 +222,69 @@ <td> <p> <blockquote> - + <p> +<i>Note: These issues were fixed in Apache Tomcat 6.0.21 but the + release votes for the 6.0.21, 6.0.22 and 6.0.23 release candidates did + not pass. Therefore, although users must download 6.0.24 to obtain a + version that includes fixes for these issues, versions 6.0.21 onwards + are not included in the list of affected versions.</i> +</p> + + <p> +<strong>Low: Arbitrary file deletion and/or alteration on deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693"> + CVE-2009-2693</a> +</p> + + <p>When deploying WAR files, the WAR files were not checked for directory + traversal attempts. This allows an attacker to create arbitrary content + outside of the web root by including entries such as + <code>../../bin/catalina.sh</code> in the WAR.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=892815&view=rev"> + revision 892815</a>.</p> + + <p>Affects: 6.0.0-6.0.20</p> + + <p> +<strong>Low: Insecure partial deploy after failed deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901"> + CVE-2009-2901</a> +</p> + + <p>By default, Tomcat automatically deploys any directories placed in a + host's appBase. This behaviour is controlled by the autoDeploy attribute + of a host which defaults to true. After a failed undeploy, the remaining + files will be deployed as a result of the autodeployment process. + Depending on circumstances, files normally protected by one or more + security constraints may be deployed without those security constraints, + making them accessible without authentication.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=892815&view=rev"> + revision 892815</a>.</p> + + <p>Affects: 6.0.0-6.0.20</p> + <p> -<i>Note: It is expected that this issue will be fixed in 6.0.21 but the - patch has not yet received the necessary votes to be applied to the 6.0.x - code base.</i> +<strong>Low: Unexpected file deletion in work directory</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902"> + CVE-2009-2902</a> </p> + + <p>When deploying WAR files, the WAR file names were not checked for + directory traversal attempts. For example, deploying and undeploying + <code>...war</code> allows an attacker to cause the deletion of the + current contents of the host's work directory which may cause problems + for currently running applications.</p> + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=892815&view=rev"> + revision 892815</a>.</p> + + <p>Affects: 6.0.0-6.0.20</p> + <p> <strong>Low: Insecure default password</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548"> @@ -240,6 +296,10 @@ a user is created with the name admin, roles admin and manager and a blank password.</p> + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=881771&view=rev"> + revision 881771</a>.</p> + <p>Affects: 6.0.0-6.0.20</p> </blockquote> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=902653&r1=902652&r2=902653&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Sun Jan 24 21:51:32 2010 @@ -47,6 +47,62 @@ </section> + <section name="Fixed in subversion for Apache Tomcat 5.5.x"> + + <p><i>Note: These issues will be fixed in 5.5.29 but that version has not yet + been released.</i></p> + + <p><strong>Low: Arbitrary file deletion and/or alteration on deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693"> + CVE-2009-2693</a></p> + + <p>When deploying WAR files, the WAR files were not checked for directory + traversal attempts. This allows an attacker to create arbitrary content + outside of the web root by including entries such as + <code>../../bin/catalina.sh</code> in the WAR.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=902650&view=rev"> + revision 902650</a>.</p> + + <p>Affects: 5.5.0-5.5.28</p> + + <p><strong>Low: Insecure partial deploy after failed deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901"> + CVE-2009-2901</a></p> + + <p>By default, Tomcat automatically deploys any directories placed in a + host's appBase. This behaviour is controlled by the autoDeploy attribute + of a host which defaults to true. After a failed undeploy, the remaining + files will be deployed as a result of the autodeployment process. + Depending on circumstances, files normally protected by one or more + security constraints may be deployed without those security constraints, + making them accessible without authentication.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=902650&view=rev"> + revision 902650</a>.</p> + + <p>Affects: 5.5.0-5.5.28</p> + + <p><strong>Low: Unexpected file deletion in work directory</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902"> + CVE-2009-2902</a></p> + + <p>When deploying WAR files, the WAR file names were not checked for + directory traversal attempts. For example, deploying and undeploying + <code>...war</code> allows an attacker to cause the deletion of the + current contents of the host's work directory which may cause problems + for currently running applications.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=902650&view=rev"> + revision 902650</a>.</p> + + <p>Affects: 5.5.0-5.5.28</p> + + </section> + <section name="Fixed in Apache Tomcat 5.5.28"> <p><strong>Important: Information Disclosure</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515"> Modified: tomcat/site/trunk/xdocs/security-6.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=902653&r1=902652&r2=902653&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-6.xml (original) +++ tomcat/site/trunk/xdocs/security-6.xml Sun Jan 24 21:51:32 2010 @@ -22,12 +22,62 @@ </section> - <section name="Not fixed in Apache Tomcat 6.0.x"> - - <p><i>Note: It is expected that this issue will be fixed in 6.0.21 but the - patch has not yet received the necessary votes to be applied to the 6.0.x - code base.</i></p> + <section name="Fixed in Apache Tomcat 6.0.24"> + <p><i>Note: These issues were fixed in Apache Tomcat 6.0.21 but the + release votes for the 6.0.21, 6.0.22 and 6.0.23 release candidates did + not pass. Therefore, although users must download 6.0.24 to obtain a + version that includes fixes for these issues, versions 6.0.21 onwards + are not included in the list of affected versions.</i></p> + + <p><strong>Low: Arbitrary file deletion and/or alteration on deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693"> + CVE-2009-2693</a></p> + + <p>When deploying WAR files, the WAR files were not checked for directory + traversal attempts. This allows an attacker to create arbitrary content + outside of the web root by including entries such as + <code>../../bin/catalina.sh</code> in the WAR.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=892815&view=rev"> + revision 892815</a>.</p> + <p>Affects: 6.0.0-6.0.20</p> + + <p><strong>Low: Insecure partial deploy after failed deploy</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901"> + CVE-2009-2901</a></p> + + <p>By default, Tomcat automatically deploys any directories placed in a + host's appBase. This behaviour is controlled by the autoDeploy attribute + of a host which defaults to true. After a failed undeploy, the remaining + files will be deployed as a result of the autodeployment process. + Depending on circumstances, files normally protected by one or more + security constraints may be deployed without those security constraints, + making them accessible without authentication.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=892815&view=rev"> + revision 892815</a>.</p> + + <p>Affects: 6.0.0-6.0.20</p> + + <p><strong>Low: Unexpected file deletion in work directory</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902"> + CVE-2009-2902</a></p> + + <p>When deploying WAR files, the WAR file names were not checked for + directory traversal attempts. For example, deploying and undeploying + <code>...war</code> allows an attacker to cause the deletion of the + current contents of the host's work directory which may cause problems + for currently running applications.</p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=892815&view=rev"> + revision 892815</a>.</p> + + <p>Affects: 6.0.0-6.0.20</p> + <p><strong>Low: Insecure default password</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548"> CVE-2009-3548</a></p> @@ -37,6 +87,10 @@ a user is created with the name admin, roles admin and manager and a blank password.</p> + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=881771&view=rev"> + revision 881771</a>.</p> + <p>Affects: 6.0.0-6.0.20</p> </section> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org