https://issues.apache.org/bugzilla/show_bug.cgi?id=50156
Mark Thomas <ma...@apache.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WONTFIX --- Comment #4 from Mark Thomas <ma...@apache.org> 2010-10-26 08:44:50 EDT --- Malicious users shouldn't have access to the JMX interface. If they do, they can do far more damage than this. There are legitimate use cases for over-writing an existing file and whilst there are alternative solutions for those use cases I don't see any reason to tie the hands of a system administrator unnecessarily. -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org