Author: markt Date: Mon Aug 29 19:49:44 2011 New Revision: 1162962 URL: http://svn.apache.org/viewvc?rev=1162962&view=rev Log: Add info for CVE-2011-3190
Modified: tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-6.html tomcat/site/trunk/docs/security-7.html tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-6.xml tomcat/site/trunk/xdocs/security-7.xml Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1162962&r1=1162961&r2=1162962&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Mon Aug 29 19:49:44 2011 @@ -215,9 +215,6 @@ <a href="#Apache_Tomcat_5.x_vulnerabilities">Apache Tomcat 5.x vulnerabilities</a> </li> <li> -<a href="#To_be_fixed_in_Apache_Tomcat_5.5.34_(not_yet_released)">To be fixed in Apache Tomcat 5.5.34 (not yet released)</a> -</li> -<li> <a href="#Fixed_in_Apache_Tomcat_5.5.34_(not_yet_released)">Fixed in Apache Tomcat 5.5.34 (not yet released)</a> </li> <li> @@ -340,61 +337,6 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> -<a name="To be fixed in Apache Tomcat 5.5.34 (not yet released)"> -<!--()--> -</a> -<a name="To_be_fixed_in_Apache_Tomcat_5.5.34_(not_yet_released)"> -<strong>To be fixed in Apache Tomcat 5.5.34 (not yet released)</strong> -</a> -</font> -</td> -</tr> -<tr> -<td> -<p> -<blockquote> - - <p> -<strong>Important: Information disclosure</strong> - <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" rel="nofollow">CVE-2011-2729</a> -</p> - - <p>Due to a bug in the capabilities code, jsvc (the service wrapper for - Linux that is part of the Commons Daemon project) does not drop - capabilities allowing the application to access files and directories - owned by superuser. This vulnerability only occurs when all of the - following are true: - <ul> - <li>Tomcat is running on a Linux operating system</li> - <li>jsvc was compiled with libcap</li> - <li>-user parameter is used</li> - </ul> - Affected Tomcat versions shipped with source files for jsvc that included - this vulnerability. - </p> - - <p>There is a <a href="http://people.apache.org/~markt/patches/2011-08-12-cve-2011-22729-tc5.patch"> - proposed patch</a> for this issue.</p> - - <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public - on 12 August 2011.</p> - - <p>Affects: 5.5.32-5.5.33</p> - - </blockquote> -</p> -</td> -</tr> -<tr> -<td> -<br/> -</td> -</tr> -</table> -<table border="0" cellspacing="0" cellpadding="2" width="100%"> -<tr> -<td bgcolor="#525D76"> -<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 5.5.34 (not yet released)"> <!--()--> </a> @@ -469,6 +411,65 @@ <p>Affects: 5.5.0-5.5.33</p> + <p> +<strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" rel="nofollow">CVE-2011-2729</a> +</p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>There is a <a href="http://people.apache.org/~markt/patches/2011-08-12-cve-2011-22729-tc5.patch"> + proposed patch</a> for this issue.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 5.5.32-5.5.33</p> + + <p> +<strong>Important: Authentication bypass and information disclosure + </strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" rel="nofollow">CVE-2011-3190</a> +</p> + + <p>Apache Tomcat supports the AJP protocol which is used with reverse + proxies to pass requests and associated data about the request from the + reverse proxy to Tomcat. The AJP protocol is designed so that when a + request includes a request body, an unsolicited AJP message is sent to + Tomcat that includes the first part (or possibly all) of the request + body. In certain circumstances, Tomcat did not process this message as a + request body but as a new request. This permitted an attacker to have + full control over the AJP message permitting authentication bypass and + information disclosure. This vulnerability only occurs when all of the + following are true: + <ul> + <li>The org.apache.jk.server.JkCoyoteHandler AJP connector is not used + </li> + <li>POST requests are accepted</li> + <li>The request body is not processed</li> + </ul> + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1162960&view=rev"> + 1162960</a>.</p> + + <p>This was reported publicly on 20th August 2011.</p> + + <p>Affects: 5.0.0-5.0.33</p> + </blockquote> </p> </td> Modified: tomcat/site/trunk/docs/security-6.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1162962&r1=1162961&r2=1162962&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-6.html (original) +++ tomcat/site/trunk/docs/security-6.html Mon Aug 29 19:49:44 2011 @@ -3,18 +3,18 @@ <html> <head> <title>Apache Tomcat - Apache Tomcat 6 vulnerabilities</title> -<meta content="Apache Tomcat Project" name="author" /> -<link rel="stylesheet" href="stylesheets/tomcat.css" type="text/css" /> -<link media="print" rel="stylesheet" href="stylesheets/tomcat-printer.css" type="text/css" /> +<meta name="author" content="Apache Tomcat Project"/> +<link type="text/css" href="stylesheets/tomcat.css" rel="stylesheet"/> +<link type="text/css" href="stylesheets/tomcat-printer.css" rel="stylesheet" media="print"/> </head> -<body vlink="#525D76" alink="#525D76" link="#525D76" text="#000000" bgcolor="#ffffff"> -<table cellspacing="0" width="100%" border="0"> +<body bgcolor="#ffffff" text="#000000" link="#525D76" alink="#525D76" vlink="#525D76"> +<table border="0" width="100%" cellspacing="0"> <!--PAGE HEADER--> <tr> <td> <!--PROJECT LOGO--> <a href="http://tomcat.apache.org/"> -<img border="0" alt="Tomcat Logo" align="left" src="./images/tomcat.gif" /> +<img src="./images/tomcat.gif" align="left" alt="Tomcat Logo" border="0"/> </a> </td> <td> @@ -25,28 +25,28 @@ <td> <!--APACHE LOGO--> <a href="http://www.apache.org/"> -<img border="0" alt="Apache Logo" align="right" src="http://www.apache.org/images/asf-logo.gif" /> +<img src="http://www.apache.org/images/asf-logo.gif" align="right" alt="Apache Logo" border="0"/> </a> </td> </tr> </table> <div class="searchbox noPrint"> -<form method="get" action="http://www.google.com/search"> -<input type="hidden" name="sitesearch" value="tomcat.apache.org" /> -<input type="text" id="query" name="q" size="25" value="Search the Site" /> -<input type="submit" value="Search Site" name="Search" /> +<form action="http://www.google.com/search" method="get"> +<input value="tomcat.apache.org" name="sitesearch" type="hidden"/> +<input value="Search the Site" size="25" name="q" id="query" type="text"/> +<input name="Search" value="Search Site" type="submit"/> </form> </div> -<table cellspacing="4" width="100%" border="0"> +<table border="0" width="100%" cellspacing="4"> <!--HEADER SEPARATOR--> <tr> <td colspan="2"> -<hr size="1" noshade="" /> +<hr noshade="" size="1"/> </td> </tr> <tr> <!--LEFT SIDE NAVIGATION--> -<td class="noPrint" nowrap="true" valign="top" width="20%"> +<td width="20%" valign="top" nowrap="true" class="noPrint"> <p> <strong>Apache Tomcat</strong> </p> @@ -192,11 +192,11 @@ </ul> </td> <!--RIGHT SIDE MAIN BODY--> -<td id="mainBody" align="left" valign="top" width="80%"> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<td width="80%" valign="top" align="left" id="mainBody"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Table of Contents"> <!--()--> </a> @@ -215,6 +215,9 @@ <a href="#Apache_Tomcat_6.x_vulnerabilities">Apache Tomcat 6.x vulnerabilities</a> </li> <li> +<a href="#Fixed_in_Apache_Tomcat_6.0.34_(not_yet_released)">Fixed in Apache Tomcat 6.0.34 (not yet released)</a> +</li> +<li> <a href="#Fixed_in_Apache_Tomcat_6.0.33">Fixed in Apache Tomcat 6.0.33</a> </li> <li> @@ -263,14 +266,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Apache Tomcat 6.x vulnerabilities"> <!--()--> </a> @@ -305,14 +308,74 @@ </tr> <tr> <td> -<br /> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 6.0.34 (not yet released)"> +<!--()--> +</a> +<a name="Fixed_in_Apache_Tomcat_6.0.34_(not_yet_released)"> +<strong>Fixed in Apache Tomcat 6.0.34 (not yet released)</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + + <p> +<strong>Important: Authentication bypass and information disclosure + </strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" rel="nofollow">CVE-2011-3190</a> +</p> + + <p>Apache Tomcat supports the AJP protocol which is used with reverse + proxies to pass requests and associated data about the request from the + reverse proxy to Tomcat. The AJP protocol is designed so that when a + request includes a request body, an unsolicited AJP message is sent to + Tomcat that includes the first part (or possibly all) of the request + body. In certain circumstances, Tomcat did not process this message as a + request body but as a new request. This permitted an attacker to have + full control over the AJP message permitting authentication bypass and + information disclosure. This vulnerability only occurs when all of the + following are true: + <ul> + <li>The org.apache.jk.server.JkCoyoteHandler AJP connector is not used + </li> + <li>POST requests are accepted</li> + <li>The request body is not processed</li> + </ul> + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1162959&view=rev"> + 1162959</a>.</p> + + <p>This was reported publicly on 20th August 2011.</p> + + <p>Affects: 6.0.0-6.0.33</p> + + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.33"> <!--()--> </a> @@ -421,14 +484,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.32"> <!--()--> </a> @@ -437,8 +500,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 03 Feb 2011</strong> </font> </td> @@ -480,14 +543,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.30"> <!--()--> </a> @@ -496,8 +559,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 13 Jan 2011</strong> </font> </td> @@ -578,14 +641,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.28"> <!--()--> </a> @@ -594,8 +657,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 9 Jul 2010</strong> </font> </td> @@ -665,14 +728,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.24"> <!--()--> </a> @@ -681,8 +744,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 21 Jan 2010</strong> </font> </td> @@ -786,14 +849,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.20"> <!--()--> </a> @@ -802,8 +865,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 3 Jun 2009</strong> </font> </td> @@ -928,14 +991,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.18"> <!--()--> </a> @@ -944,8 +1007,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 31 Jul 2008</strong> </font> </td> @@ -1028,14 +1091,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.16"> <!--()--> </a> @@ -1044,8 +1107,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 8 Feb 2008</strong> </font> </td> @@ -1119,14 +1182,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.14"> <!--()--> </a> @@ -1135,8 +1198,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 13 Aug 2007</strong> </font> </td> @@ -1211,14 +1274,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.11"> <!--()--> </a> @@ -1227,8 +1290,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>not released</strong> </font> </td> @@ -1272,14 +1335,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.10"> <!--()--> </a> @@ -1288,8 +1351,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 28 Feb 2007</strong> </font> </td> @@ -1335,14 +1398,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.9"> <!--()--> </a> @@ -1351,8 +1414,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 8 Feb 2007</strong> </font> </td> @@ -1378,14 +1441,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 6.0.6"> <!--()--> </a> @@ -1394,8 +1457,8 @@ </a> </font> </td> -<td bgcolor="#525D76" align="right"> -<font face="arial,helvetica.sanserif" color="#ffffff"> +<td align="right" bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica.sanserif"> <strong>released 18 Dec 2006</strong> </font> </td> @@ -1425,14 +1488,14 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> -<table width="100%" cellpadding="2" cellspacing="0" border="0"> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> <tr> <td bgcolor="#525D76"> -<font face="arial,helvetica,sanserif" color="#ffffff"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Not a vulnerability in Tomcat"> <!--()--> </a> @@ -1543,7 +1606,7 @@ </tr> <tr> <td> -<br /> +<br/> </td> </tr> </table> @@ -1552,17 +1615,17 @@ <!--FOOTER SEPARATOR--> <tr> <td colspan="2"> -<hr size="1" noshade="" /> +<hr noshade="" size="1"/> </td> </tr> <!--PAGE FOOTER--> <tr> <td colspan="2"> <div align="center"> -<font size="-1" color="#525D76"> +<font color="#525D76" size="-1"> <em> Copyright © 1999-2011, The Apache Software Foundation - <br /> + <br/> Apache Tomcat, Tomcat, Apache, the Apache feather, and the Apache Tomcat project logo are trademarks of the Apache Software Foundation. </em> Modified: tomcat/site/trunk/docs/security-7.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1162962&r1=1162961&r2=1162962&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-7.html (original) +++ tomcat/site/trunk/docs/security-7.html Mon Aug 29 19:49:44 2011 @@ -215,6 +215,9 @@ <a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x vulnerabilities</a> </li> <li> +<a href="#Fixed_in_Apache_Tomcat_7.0.21_(not_yet_released)">Fixed in Apache Tomcat 7.0.21 (not yet released)</a> +</li> +<li> <a href="#Fixed_in_Apache_Tomcat_7.0.20">Fixed in Apache Tomcat 7.0.20</a> </li> <li> @@ -299,6 +302,66 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 7.0.21 (not yet released)"> +<!--()--> +</a> +<a name="Fixed_in_Apache_Tomcat_7.0.21_(not_yet_released)"> +<strong>Fixed in Apache Tomcat 7.0.21 (not yet released)</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + + <p> +<strong>Important: Authentication bypass and information disclosure + </strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" rel="nofollow">CVE-2011-3190</a> +</p> + + <p>Apache Tomcat supports the AJP protocol which is used with reverse + proxies to pass requests and associated data about the request from the + reverse proxy to Tomcat. The AJP protocol is designed so that when a + request includes a request body, an unsolicited AJP message is sent to + Tomcat that includes the first part (or possibly all) of the request + body. In certain circumstances, Tomcat did not process this message as a + request body but as a new request. This permitted an attacker to have + full control over the AJP message permitting authentication bypass and + information disclosure. This vulnerability only occurs when all of the + following are true: + <ul> + <li>The org.apache.jk.server.JkCoyoteHandler AJP connector is not used + </li> + <li>POST requests are accepted</li> + <li>The request body is not processed</li> + </ul> + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1162958&view=rev"> + 1162958</a>.</p> + + <p>This was reported publicly on 20th August 2011.</p> + + <p>Affects: 7.0.0-7.0.20</p> + + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 7.0.20"> <!--()--> </a> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=1162962&r1=1162961&r2=1162962&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Mon Aug 29 19:49:44 2011 @@ -46,36 +46,6 @@ </section> --> - <section name="To be fixed in Apache Tomcat 5.5.34 (not yet released)"> - - <p><strong>Important: Information disclosure</strong> - <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" - rel="nofollow">CVE-2011-2729</a></p> - - <p>Due to a bug in the capabilities code, jsvc (the service wrapper for - Linux that is part of the Commons Daemon project) does not drop - capabilities allowing the application to access files and directories - owned by superuser. This vulnerability only occurs when all of the - following are true: - <ul> - <li>Tomcat is running on a Linux operating system</li> - <li>jsvc was compiled with libcap</li> - <li>-user parameter is used</li> - </ul> - Affected Tomcat versions shipped with source files for jsvc that included - this vulnerability. - </p> - - <p>There is a <a href="http://people.apache.org/~markt/patches/2011-08-12-cve-2011-22729-tc5.patch"> - proposed patch</a> for this issue.</p> - - <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public - on 12 August 2011.</p> - - <p>Affects: 5.5.32-5.5.33</p> - - </section> - <section name="Fixed in Apache Tomcat 5.5.34 (not yet released)"> <p><strong>Low: Information disclosure</strong> @@ -136,6 +106,63 @@ <p>Affects: 5.5.0-5.5.33</p> + <p><strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" + rel="nofollow">CVE-2011-2729</a></p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>There is a <a href="http://people.apache.org/~markt/patches/2011-08-12-cve-2011-22729-tc5.patch"> + proposed patch</a> for this issue.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 5.5.32-5.5.33</p> + + <p><strong>Important: Authentication bypass and information disclosure + </strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" + rel="nofollow">CVE-2011-3190</a></p> + + <p>Apache Tomcat supports the AJP protocol which is used with reverse + proxies to pass requests and associated data about the request from the + reverse proxy to Tomcat. The AJP protocol is designed so that when a + request includes a request body, an unsolicited AJP message is sent to + Tomcat that includes the first part (or possibly all) of the request + body. In certain circumstances, Tomcat did not process this message as a + request body but as a new request. This permitted an attacker to have + full control over the AJP message permitting authentication bypass and + information disclosure. This vulnerability only occurs when all of the + following are true: + <ul> + <li>The org.apache.jk.server.JkCoyoteHandler AJP connector is not used + </li> + <li>POST requests are accepted</li> + <li>The request body is not processed</li> + </ul> + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1162960&view=rev"> + 1162960</a>.</p> + + <p>This was reported publicly on 20th August 2011.</p> + + <p>Affects: 5.0.0-5.0.33</p> + </section> <section name="Fixed in Apache Tomcat 5.5.32" rtext="released 1 Feb 2011"> Modified: tomcat/site/trunk/xdocs/security-6.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=1162962&r1=1162961&r2=1162962&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-6.xml (original) +++ tomcat/site/trunk/xdocs/security-6.xml Mon Aug 29 19:49:44 2011 @@ -30,6 +30,42 @@ </section> + + <section name="Fixed in Apache Tomcat 6.0.34 (not yet released)"> + + <p><strong>Important: Authentication bypass and information disclosure + </strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" + rel="nofollow">CVE-2011-3190</a></p> + + <p>Apache Tomcat supports the AJP protocol which is used with reverse + proxies to pass requests and associated data about the request from the + reverse proxy to Tomcat. The AJP protocol is designed so that when a + request includes a request body, an unsolicited AJP message is sent to + Tomcat that includes the first part (or possibly all) of the request + body. In certain circumstances, Tomcat did not process this message as a + request body but as a new request. This permitted an attacker to have + full control over the AJP message permitting authentication bypass and + information disclosure. This vulnerability only occurs when all of the + following are true: + <ul> + <li>The org.apache.jk.server.JkCoyoteHandler AJP connector is not used + </li> + <li>POST requests are accepted</li> + <li>The request body is not processed</li> + </ul> + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1162959&view=rev"> + 1162959</a>.</p> + + <p>This was reported publicly on 20th August 2011.</p> + + <p>Affects: 6.0.0-6.0.33</p> + + </section> + <section name="Fixed in Apache Tomcat 6.0.33"> <p><strong>Low: Information disclosure</strong> Modified: tomcat/site/trunk/xdocs/security-7.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1162962&r1=1162961&r2=1162962&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-7.xml (original) +++ tomcat/site/trunk/xdocs/security-7.xml Mon Aug 29 19:49:44 2011 @@ -25,6 +25,41 @@ <a href="mailto:secur...@tomcat.apache.org">Tomcat Security Team</a>.</p> </section> + <section name="Fixed in Apache Tomcat 7.0.21 (not yet released)"> + + <p><strong>Important: Authentication bypass and information disclosure + </strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" + rel="nofollow">CVE-2011-3190</a></p> + + <p>Apache Tomcat supports the AJP protocol which is used with reverse + proxies to pass requests and associated data about the request from the + reverse proxy to Tomcat. The AJP protocol is designed so that when a + request includes a request body, an unsolicited AJP message is sent to + Tomcat that includes the first part (or possibly all) of the request + body. In certain circumstances, Tomcat did not process this message as a + request body but as a new request. This permitted an attacker to have + full control over the AJP message permitting authentication bypass and + information disclosure. This vulnerability only occurs when all of the + following are true: + <ul> + <li>The org.apache.jk.server.JkCoyoteHandler AJP connector is not used + </li> + <li>POST requests are accepted</li> + <li>The request body is not processed</li> + </ul> + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1162958&view=rev"> + 1162958</a>.</p> + + <p>This was reported publicly on 20th August 2011.</p> + + <p>Affects: 7.0.0-7.0.20</p> + + </section> + <section name="Fixed in Apache Tomcat 7.0.20"> <p><strong>Important: Information disclosure</strong> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org