Author: rjung
Date: Fri May 18 12:10:19 2007
New Revision: 539565
URL: http://svn.apache.org/viewvc?view=rev&rev=539565
Log:
Update jk connectors security pages.
Modified:
tomcat/site/trunk/docs/security-jk.html
tomcat/site/trunk/xdocs/security-jk.xml
Modified: tomcat/site/trunk/docs/security-jk.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-jk.html?view=diff&rev=539565&r1=539564&r2=539565
==============================================================================
--- tomcat/site/trunk/docs/security-jk.html (original)
+++ tomcat/site/trunk/docs/security-jk.html Fri May 18 12:10:19 2007
@@ -2,7 +2,7 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
-<title>Apache Tomcat - Apache Tomcat 6.x vulnerabilities</title>
+<title>Apache Tomcat - Apache Tomcat JK Connectors vulnerabilities</title>
<meta name="author" value="Apache Tomcat Project"/>
<meta name="email" value=""/>
<link type="text/css" href="stylesheets/tomcat.css" rel="stylesheet"/>
@@ -196,6 +196,62 @@
and the CVE list. Please send comments or corrections for these
vulnerabilities to the <a href="mailto:[EMAIL PROTECTED]">Tomcat
Security Team</a>.</p>
+
+ </blockquote>
+</p>
+</td>
+</tr>
+<tr>
+<td>
+<br/>
+</td>
+</tr>
+</table>
+<table border="0" cellspacing="0" cellpadding="2" width="100%">
+<tr>
+<td bgcolor="#525D76">
+<font color="#ffffff" face="arial,helvetica,sanserif">
+<a name="Fixed in Apache Tomcat JK Connector 1.2.23">
+<strong>Fixed in Apache Tomcat JK Connector 1.2.23</strong>
+</a>
+</font>
+</td>
+</tr>
+<tr>
+<td>
+<p>
+<blockquote>
+ <p>
+<strong>important: Information disclosure</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860">
+ CVE-2007-1860 (patch for CVE-2007-0450 was insufficient)</a>
+</p>
+
+ <p>When multiple components (firewalls, caches, proxies and Tomcat)
+ process a request, the request URL should not get decoded multiple times
+ in an iterative way by these components. Otherwise it might be possible
+ to pass access control rules implemented on front of the last component
+ by applying multiple URL encoding to the request.
+ </p>
+
+ <p>mod_jk before version 1.2.23 by default decoded request URLs inside
Apache
+ httpd and forwarded the encoded URL to Tomcat, which itself did a second
+ decoding. This made it possible to pass a prefix JkMount for /someapp,
+ but actually access /otherapp on Tomcat. Starting with version 1.2.23
+ by default mod_jk forwards the original unchanged request URL to Tomcat.
+ You can achieve the same level of security for older versions by setting
+ the forwarding option "JkOption ForwardURICompatUnparsed".
+ </p>
+
+ <p>Please note, that your configuration might contain a different
forwarding
+ JkOption. In this case, please consult the
+ <a
href="http://tomcat.apache.org/connectors-doc/reference/apache.html#Forwarding">
+ forwarding documentation</a> concerning the security implications.
+ The new default setting is more secure than before, but it breaks
+ interoperability with mod_rwrite.
+ </p>
+
+ <p>Affects: All versions of JK, but only the Apache httpd mod_jk module</p>
</blockquote>
</p>
Modified: tomcat/site/trunk/xdocs/security-jk.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-jk.xml?view=diff&rev=539565&r1=539564&r2=539565
==============================================================================
--- tomcat/site/trunk/xdocs/security-jk.xml (original)
+++ tomcat/site/trunk/xdocs/security-jk.xml Fri May 18 12:10:19 2007
@@ -3,7 +3,7 @@
<properties>
<author>Apache Tomcat Project</author>
- <title>Apache Tomcat 6.x vulnerabilities</title>
+ <title>Apache Tomcat JK Connectors vulnerabilities</title>
</properties>
<body>
@@ -21,6 +21,39 @@
and the CVE list. Please send comments or corrections for these
vulnerabilities to the <a href="mailto:[EMAIL PROTECTED]">Tomcat
Security Team</a>.</p>
+
+ </section>
+
+ <section name="Fixed in Apache Tomcat JK Connector 1.2.23">
+ <p><strong>important: Information disclosure</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860">
+ CVE-2007-1860 (patch for CVE-2007-0450 was insufficient)</a></p>
+
+ <p>When multiple components (firewalls, caches, proxies and Tomcat)
+ process a request, the request URL should not get decoded multiple times
+ in an iterative way by these components. Otherwise it might be possible
+ to pass access control rules implemented on front of the last component
+ by applying multiple URL encoding to the request.
+ </p>
+
+ <p>mod_jk before version 1.2.23 by default decoded request URLs inside
Apache
+ httpd and forwarded the encoded URL to Tomcat, which itself did a second
+ decoding. This made it possible to pass a prefix JkMount for /someapp,
+ but actually access /otherapp on Tomcat. Starting with version 1.2.23
+ by default mod_jk forwards the original unchanged request URL to Tomcat.
+ You can achieve the same level of security for older versions by setting
+ the forwarding option "JkOption ForwardURICompatUnparsed".
+ </p>
+
+ <p>Please note, that your configuration might contain a different
forwarding
+ JkOption. In this case, please consult the
+ <a
href="http://tomcat.apache.org/connectors-doc/reference/apache.html#Forwarding">
+ forwarding documentation</a> concerning the security implications.
+ The new default setting is more secure than before, but it breaks
+ interoperability with mod_rwrite.
+ </p>
+
+ <p>Affects: All versions of JK, but only the Apache httpd mod_jk module</p>
</section>
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]