https://issues.apache.org/bugzilla/show_bug.cgi?id=51698

             Bug #: 51698
           Summary: ajp CPing/Forward-Request packet forgery, is a design
                    decision? or a security vulnerability?
           Product: Tomcat 7
           Version: 7.0.20
          Platform: PC
        OS/Version: Windows XP
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Connectors
        AssignedTo: dev@tomcat.apache.org
        ReportedBy: zhh200...@gmail.com
    Classification: Unclassified


Created attachment 27416
  --> https://issues.apache.org/bugzilla/attachment.cgi?id=27416
ajp CPing packet forgery example

because the ajp "Data" packet no "CodeType"
and tomcat adopts lazy-reading strategy for reading ajp "Data" packet,
(i.e., if you don't invoke request.getParameter("XXX"),tomcat does't read post
request "Data" packet)

so,the current "Data" packet keeping in the socket inputstream,
the connection is keep-alive, ajp bio/nio procesor reading the next packet,
this time, is "Data" packet。

if the first byte of "Data" packet'length is 0x02(Code Type of Forward Request
Packet) or 0x0A(Code Type of CPing Packet),
then tomcat will be in trouble.

please see the attachments.

firt example: ajp CPing packet forgery example

second example: ajp Forward-Request packet forgery

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to