https://issues.apache.org/bugzilla/show_bug.cgi?id=50156

Mark Thomas <ma...@apache.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |WONTFIX

--- Comment #4 from Mark Thomas <ma...@apache.org> 2010-10-26 08:44:50 EDT ---
Malicious users shouldn't have access to the JMX interface. If they do, they
can do far more damage than this.

There are legitimate use cases for over-writing an existing file and whilst
there are alternative solutions for those use cases I don't see any reason to
tie the hands of a system administrator unnecessarily.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to