Author: markt
Date: Tue Jun 6 10:21:52 2017
New Revision: 1797770
URL: http://svn.apache.org/viewvc?rev=1797770&view=rev
Log:
Add CVE-2017-5664
Modified:
tomcat/site/trunk/docs/security-7.html
tomcat/site/trunk/docs/security-8.html
tomcat/site/trunk/docs/security-9.html
tomcat/site/trunk/xdocs/security-7.xml
tomcat/site/trunk/xdocs/security-8.xml
tomcat/site/trunk/xdocs/security-9.xml
Modified: tomcat/site/trunk/docs/security-7.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Tue Jun 6 10:21:52 2017
@@ -227,6 +227,9 @@
<a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x
vulnerabilities</a>
</li>
<li>
+<a href="#Fixed_in_Apache_Tomcat_7.0.78">Fixed in Apache Tomcat 7.0.78</a>
+</li>
+<li>
<a href="#Fixed_in_Apache_Tomcat_7.0.77">Fixed in Apache Tomcat 7.0.77</a>
</li>
<li>
@@ -380,6 +383,64 @@
</div>
+<h3 id="Fixed_in_Apache_Tomcat_7.0.78">
+<span style="float: right;">16 May 2017</span> Fixed in Apache Tomcat
7.0.78</h3>
+<div class="text">
+
+
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+
+<p>The error page mechanism of the Java Servlet Specification requires that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+
+<p>If the error page is a static file, expected behaviour is to serve content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+
+<p>Notes for other user provided error pages:</p>
+
+<ul>
+
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+
+<li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+
+</ul>
+
+
+<p>This was fixed in revisions <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793471">1793471</a> and
+ <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793491">1793491</a>.</p>
+
+
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+
+<p>Affects: 7.0.0 to 7.0.77</p>
+
+
+</div>
<h3 id="Fixed_in_Apache_Tomcat_7.0.77">
<span style="float: right;">2 April 2017</span> Fixed in Apache Tomcat
7.0.77</h3>
<div class="text">
Modified: tomcat/site/trunk/docs/security-8.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Tue Jun 6 10:21:52 2017
@@ -227,6 +227,12 @@
<a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x
vulnerabilities</a>
</li>
<li>
+<a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache Tomcat 8.0.44</a>
+</li>
+<li>
+<a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache Tomcat 8.5.15</a>
+</li>
+<li>
<a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a>
</li>
<li>
@@ -341,6 +347,122 @@
</div>
+<h3 id="Fixed_in_Apache_Tomcat_8.0.44">
+<span style="float: right;">16 May 2017</span> Fixed in Apache Tomcat
8.0.44</h3>
+<div class="text">
+
+
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+
+<p>The error page mechanism of the Java Servlet Specification requires that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+
+<p>If the error page is a static file, expected behaviour is to serve content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+
+<p>Notes for other user provided error pages:</p>
+
+<ul>
+
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+
+<li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+
+</ul>
+
+
+<p>This was fixed in revisions <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793470">1793470</a> and
+ <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793489">1793489</a>.</p>
+
+
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+
+<p>Affects: 8.0.0.RC1 to 8.0.43</p>
+
+
+</div>
+<h3 id="Fixed_in_Apache_Tomcat_8.5.15">
+<span style="float: right;">10 May 2017</span> Fixed in Apache Tomcat
8.5.15</h3>
+<div class="text">
+
+
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+
+<p>The error page mechanism of the Java Servlet Specification requires that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+
+<p>If the error page is a static file, expected behaviour is to serve content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+
+<p>Notes for other user provided error pages:</p>
+
+<ul>
+
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+
+<li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+
+</ul>
+
+
+<p>This was fixed in revisions <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793469">1793469</a> and
+ <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793488">1793488</a>.</p>
+
+
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+
+<p>Affects: 8.5.0 to 8.5.14</p>
+
+
+</div>
<h3 id="Fixed_in_Apache_Tomcat_8.0.43">
<span style="float: right;">2 April 2017</span> Fixed in Apache Tomcat
8.0.43</h3>
<div class="text">
Modified: tomcat/site/trunk/docs/security-9.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Tue Jun 6 10:21:52 2017
@@ -227,6 +227,9 @@
<a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x
vulnerabilities</a>
</li>
<li>
+<a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat
9.0.0.M21</a>
+</li>
+<li>
<a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat
9.0.0.M19</a>
</li>
<li>
@@ -299,6 +302,64 @@
</div>
+<h3 id="Fixed_in_Apache_Tomcat_9.0.0.M21">
+<span style="float: right;">10 May 2017</span> Fixed in Apache Tomcat
9.0.0.M21</h3>
+<div class="text">
+
+
+<p>
+<strong>Important: Security Constraint Bypass</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664"
rel="nofollow">CVE-2017-5664</a>
+</p>
+
+
+<p>The error page mechanism of the Java Servlet Specification requires that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+
+<p>If the error page is a static file, expected behaviour is to serve content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+
+<p>Notes for other user provided error pages:</p>
+
+<ul>
+
+<li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+
+<li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+
+</ul>
+
+
+<p>This was fixed in revisions <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793468">1793468</a> and
+ <a
href="http://svn.apache.org/viewvc?view=rev&rev=1793487">1793487</a>.</p>
+
+
+<p>This issue was reported responsibly to the Apache Tomcat Security Team by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+
+<p>Affects: 9.0.0.M1 to 9.0.0.M20</p>
+
+
+</div>
<h3 id="Fixed_in_Apache_Tomcat_9.0.0.M19">
<span style="float: right;">30 March 2017</span> Fixed in Apache Tomcat
9.0.0.M19</h3>
<div class="text">
Modified: tomcat/site/trunk/xdocs/security-7.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Tue Jun 6 10:21:52 2017
@@ -50,6 +50,49 @@
</section>
+ <section name="Fixed in Apache Tomcat 7.0.78" rtext="16 May 2017">
+
+ <p><strong>Important: Security Constraint Bypass</strong>
+ <cve>CVE-2017-5664</cve></p>
+
+ <p>The error page mechanism of the Java Servlet Specification requires
that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+ <p>If the error page is a static file, expected behaviour is to serve
content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+ <p>Notes for other user provided error pages:</p>
+ <ul>
+ <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+ <li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+ </ul>
+
+ <p>This was fixed in revisions <revlink rev="1793471">1793471</revlink> and
+ <revlink rev="1793491">1793491</revlink>.</p>
+
+ <p>This issue was reported responsibly to the Apache Tomcat Security Team
by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+ <p>Affects: 7.0.0 to 7.0.77</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 7.0.77" rtext="2 April 2017">
<p><strong>Important: Information Disclosure</strong>
Modified: tomcat/site/trunk/xdocs/security-8.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Tue Jun 6 10:21:52 2017
@@ -50,6 +50,92 @@
</section>
+ <section name="Fixed in Apache Tomcat 8.0.44" rtext="16 May 2017">
+
+ <p><strong>Important: Security Constraint Bypass</strong>
+ <cve>CVE-2017-5664</cve></p>
+
+ <p>The error page mechanism of the Java Servlet Specification requires
that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+ <p>If the error page is a static file, expected behaviour is to serve
content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+ <p>Notes for other user provided error pages:</p>
+ <ul>
+ <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+ <li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+ </ul>
+
+ <p>This was fixed in revisions <revlink rev="1793470">1793470</revlink> and
+ <revlink rev="1793489">1793489</revlink>.</p>
+
+ <p>This issue was reported responsibly to the Apache Tomcat Security Team
by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+ <p>Affects: 8.0.0.RC1 to 8.0.43</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat 8.5.15" rtext="10 May 2017">
+
+ <p><strong>Important: Security Constraint Bypass</strong>
+ <cve>CVE-2017-5664</cve></p>
+
+ <p>The error page mechanism of the Java Servlet Specification requires
that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+ <p>If the error page is a static file, expected behaviour is to serve
content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+ <p>Notes for other user provided error pages:</p>
+ <ul>
+ <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+ <li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+ </ul>
+
+ <p>This was fixed in revisions <revlink rev="1793469">1793469</revlink> and
+ <revlink rev="1793488">1793488</revlink>.</p>
+
+ <p>This issue was reported responsibly to the Apache Tomcat Security Team
by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+ <p>Affects: 8.5.0 to 8.5.14</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 8.0.43" rtext="2 April 2017">
<p><strong>Important: Information Disclosure</strong>
Modified: tomcat/site/trunk/xdocs/security-9.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1797770&r1=1797769&r2=1797770&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Tue Jun 6 10:21:52 2017
@@ -50,6 +50,49 @@
</section>
+ <section name="Fixed in Apache Tomcat 9.0.0.M21" rtext="10 May 2017">
+
+ <p><strong>Important: Security Constraint Bypass</strong>
+ <cve>CVE-2017-5664</cve></p>
+
+ <p>The error page mechanism of the Java Servlet Specification requires
that,
+ when an error occurs and an error page is configured for the error that
+ occurred, the original request and response are forwarded to the error
+ page. This means that the request is presented to the error page with
the
+ original HTTP method.</p>
+
+ <p>If the error page is a static file, expected behaviour is to serve
content
+ of the file as if processing a GET request, regardless of the actual HTT
+ method. Tomcat's Default Servlet did not do this. Depending on the
+ original request this could lead to unexpected and undesirable results
for
+ static error pages including, if the DefaultServlet is configured to
+ permit writes, the replacement or removal of the custom error page.</p>
+
+ <p>Notes for other user provided error pages:</p>
+ <ul>
+ <li>Unless explicitly coded otherwise, JSPs ignore the the HTTP method.
+ JSPs used as error pages must must ensure that they handle any error
+ dispatch as a GET request, regardless of the actual method.</li>
+ <li>By default, the response generated by a Servlet does depend on the
+ HTTP method. Custom Servlets used as error pages must ensure that
+ they handle any error dispatch as a GET request, regardless of the
+ actual method.</li>
+ </ul>
+
+ <p>This was fixed in revisions <revlink rev="1793468">1793468</revlink> and
+ <revlink rev="1793487">1793487</revlink>.</p>
+
+ <p>This issue was reported responsibly to the Apache Tomcat Security Team
by
+ Aniket Nandkishor Kulkarni from Tata Consultancy Services Ltd, Mumbai,
+ India as a vulnerability that allowed the restrictions on OPTIONS and
+ TRACE requests to be bypassed on 21 April 2017. The full implications of
+ this issue were identified by the Tomcat Security Team on 24 April 2017.
+ This issue was made public on 6 June 2017.</p>
+
+ <p>Affects: 9.0.0.M1 to 9.0.0.M20</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 9.0.0.M19" rtext="30 March 2017">
<p><strong>Important: Information Disclosure</strong>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]