https://issues.apache.org/bugzilla/show_bug.cgi?id=50958

Mark Thomas <ma...@apache.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID

--- Comment #1 from Mark Thomas <ma...@apache.org> 2011-03-24 11:52:28 EDT ---
(In reply to comment #0)
> Created an attachment (id=26793)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=26793) [details]
> Contains test WAR and ISAPI config files
> 
> The ISAPI plugin seems to be vulnerable to HTTP response splitting attacks.

No it isn't. An HTTP response splitting attack is something triggered by client
input, not by an application.

> The plugin code doesn't filter CRLFs from response header values before the
> response is sent to the client. Tomcat replaces CRLFs with spaces when 
> accessed
> directly through an HTTP connector. I suggest the ISAPI plugin does the same.

That the HTTP connectors and the newer AJP connectors stop developers shooting
themselves in the foot (at least in this way) whereas the older BIO AJP does
not (the filtering is in the Tomcat connector not the ISAPI native code) is a
benefit of the newer connectors but does not represent a vulnerability in the
older BIO AJP connector.

The was a vulnerability in this area in the past, CVE-2008-1232, that was
triggered by using non-filtered client supplied data directly in an HTTP
response header.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to