DO NOT REPLY [Bug 12968] - [Possible security hole?] package.access security in Catalina/CatalinaService

2002-09-25 Thread bugzilla
/show_bug.cgi?id=12968 [Possible security hole?] package.access security in Catalina/CatalinaService --- Additional Comments From [EMAIL PROTECTED] 2002-09-25 17:36 --- Ouch! Glenn, I was just pointing out that since you take the time to protect the subpackages of org.apache.catalina

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosurevulnerability

2002-09-25 Thread Jon Scott Stevens
on 2002/9/25 6:27 AM, Costin Manolache [EMAIL PROTECTED] wrote: Well, this is not a very good policy IMO. Self-contained applications are a good thing ( IMO ). Then store your templates in the WEB-INF directory. That is what we do with Scarab, which is 100% self contained. And of course,

RE: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Bojan Smojver
On Wed, 2002-09-25 at 20:59, John Trollinger wrote: Don't buy all the velocity hype.. It is not as great as they make it out to be. What hype? I don't follow here... Velocity is just a template language, plain, simple and relatively small. It's greatness comes from the fact that you cannot

RE: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Costin Manolache
Bojan Smojver wrote: On Wed, 2002-09-25 at 20:59, John Trollinger wrote: Don't buy all the velocity hype.. It is not as great as they make it out to be. What hype? I don't follow here... Velocity is just a template language, plain, simple and relatively small. It's greatness comes

RE: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Bojan Smojver
Quoting Costin Manolache [EMAIL PROTECTED]: And Velocity does have a mailing list where all this can be discussed. This is tomcat-dev - for servlet and jsp development. If you have any ideas on how to improve jasper - great, but please don't waste our time with off topic subjects.

RE: [SECURITY] Apache Tomcat 4.x JSP source disclosurevulnerability

2002-09-25 Thread Bob Herrmann
With power comes responsibility. % System.exit(1) % -bob P.S. Yea, I know the SecurityManager can catch this, if enabled. On Wed, 2002-09-25 at 21:22, Bojan Smojver wrote: Quoting Costin Manolache [EMAIL PROTECTED]: And Velocity does have a mailing list where all this can be discussed.

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Tim Funk
That's what code reviews are for and in absence of that - firing your developers. Wouldn't I also get an out of memory with this in Velocity? #set($oom = ) #foreach( $i in [-2147483648..2147483648] ) #set($oom =

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Bojan Smojver
Not if: runtime.interpolate.string.literals = false Bojan Quoting Tim Funk [EMAIL PROTECTED]: That's what code reviews are for and in absence of that - firing your developers. Wouldn't I also get an out of memory with this in Velocity? #set($oom =

DO NOT REPLY [Bug 12968] - [Possible security hole?] package.access security in Catalina/CatalinaService

2002-09-25 Thread bugzilla
/show_bug.cgi?id=12968 [Possible security hole?] package.access security in Catalina/CatalinaService --- Additional Comments From [EMAIL PROTECTED] 2002-09-26 02:50 --- Vetting applications for security vulnerabilities is important. I applaud efforts to do so, the more eyes reviewing _and_

RE: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Costin Manolache
Bojan Smojver wrote: All right then, let's talk about JSP's. If I host my clients' JSP's on my server and a web designer puts this in (BTW, he wasn't forced, he simply decided he wanted to do it): And your proposed solution is ... ? Do you have a patch to solve this problem ? If so, send

[OT] Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Bill Barker
I'm agreeing with Costin. Please move this discussion to [EMAIL PROTECTED] It is off-topic here. - Original Message - From: Bojan Smojver [EMAIL PROTECTED] To: Tomcat Developers List [EMAIL PROTECTED] Sent: Wednesday, September 25, 2002 7:33 PM Subject: Re: [SECURITY] Apache Tomcat 4.x

RE: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Bojan Smojver
Quoting Costin Manolache [EMAIL PROTECTED]: Bojan Smojver wrote: All right then, let's talk about JSP's. If I host my clients' JSP's on my server and a web designer puts this in (BTW, he wasn't forced, he simply decided he wanted to do it): And your proposed solution is ... ? Don't

Re: [OT] Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-25 Thread Bojan Smojver
Quoting Bill Barker [EMAIL PROTECTED]: I'm agreeing with Costin. Please move this discussion to [EMAIL PROTECTED] It is off-topic here. Promise not to write a single byte on this topic on Tomcat-Dev list after this e-mail. Bojan - This mail

[SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Remy Maucherat
A security vulnerability has been confirmed to exist in all Apache Tomcat 4.x releases (including Tomcat 4.0.4 and Tomcat 4.1.10), which allows to use a specially crafted URL to return the unprocessed source of a JSP page, or, under special circumstances, a static resource which would

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Tim Funk
Would the following be vulnerable? 1) Use Jk only 2) do NOT use -- JkMount /servlet/* loadbalancer 3) But the invoker mapping is enabled Would they be vulnerable? I personally don't see a security flaw in this config. But does Jk also look for the text jsessionid being passed in the URL

RE: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Marx, Mitchell E (Mitch), ALCNS
Developers List; Tomcat Users List; announcements Subject: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability A security vulnerability has been confirmed to exist in all Apache Tomcat 4.x releases (including Tomcat 4.0.4 and Tomcat 4.1.10), which allows to use a specially crafted URL

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Remy Maucherat
Tim Funk wrote: Would the following be vulnerable? 1) Use Jk only 2) do NOT use -- JkMount /servlet/* loadbalancer 3) But the invoker mapping is enabled Would they be vulnerable? I personally don't see a security flaw in this config. But does Jk also look for the text jsessionid being

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Remy Maucherat
Remy Maucherat wrote: Tim Funk wrote: Would the following be vulnerable? 1) Use Jk only 2) do NOT use -- JkMount /servlet/* loadbalancer 3) But the invoker mapping is enabled Would they be vulnerable? I personally don't see a security flaw in this config. But does Jk also look

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Remy Maucherat
Marx, Mitchell E (Mitch), ALCNS wrote: Evil question: does this vulnerability exist in Tomcat 3.2.3? No. At worst it would be vulnerable to a distant cousin of the exploit. Remy -- To unsubscribe, e-mail: mailto:[EMAIL PROTECTED] For additional commands, e-mail: mailto:[EMAIL PROTECTED]

DO NOT REPLY [Bug 12968] New: - [Possible security hole?] package.access security in Catalina/CatalinaService

2002-09-24 Thread bugzilla
/show_bug.cgi?id=12968 [Possible security hole?] package.access security in Catalina/CatalinaService Summary: [Possible security hole?] package.access security in Catalina/CatalinaService Product: Tomcat 4 Version: 4.0.4 Final Platform: Other

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Matt Fury
] wrote: A security vulnerability has been confirmed to exist in all Apache Tomcat 4.x releases (including Tomcat 4.0.4 and Tomcat 4.1.10), which allows to use a specially crafted URL to return the unprocessed source of a JSP page, or, under special circumstances, a static resource which

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosurevulnerability

2002-09-24 Thread Jon Scott Stevens
on 2002/9/24 4:59 AM, Remy Maucherat [EMAIL PROTECTED] wrote: A security vulnerability has been confirmed to exist in all Apache Tomcat 4.x releases (including Tomcat 4.0.4 and Tomcat 4.1.10), which allows to use a specially crafted URL to return the unprocessed source of a JSP page

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-24 Thread Ian Darwin
On September 23, 2002 10:04 am, Remy Maucherat wrote: A security vulnerability which affects all releases of Tomcat 4.x has been discovered. It is proposed that new Tomcat 4.0.x and 4.1.x releases are made, at which time the exploit will be publicized. The security advisory will also

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Glenn Nielsen
This list is for discussing Tomcat development, not velocity, web macro, et. al. The evangelizing for velocity is off topic in this list. JSP is part of Tomcat, live with it and move on. There are plenty of other forums for discussing the merits of one web templating technology vs another.

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Steve Downey
On Tuesday 24 September 2002 05:26 pm, Jon Scott Stevens wrote: on 2002/9/24 4:59 AM, Remy Maucherat [EMAIL PROTECTED] wrote: A security vulnerability has been confirmed to exist in all Apache Tomcat 4.x releases (including Tomcat 4.0.4 and Tomcat 4.1.10), which allows to use a specially

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosurevulnerability

2002-09-24 Thread Jon Scott Stevens
on 2002/9/24 5:15 PM, Steve Downey [EMAIL PROTECTED] wrote: http://localhost:8080/velexample/servlet/org.apache.catalina.servlets.DefaultS ervlet/sample.vm Unlike JSP, we don't store (or encourage people to store) .vm files in the webroot. They can be anywhere on the fileystem and with custom

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Bojan Smojver
Quoting Glenn Nielsen [EMAIL PROTECTED]: This list is for discussing Tomcat development, not velocity, web macro, et. al. The evangelizing for velocity is off topic in this list. JSP is part of Tomcat, live with it and move on. There are plenty of other forums for discussing the

Re: [SECURITY] Apache Tomcat 4.x JSP source disclosure vulnerability

2002-09-24 Thread Bojan Smojver
Quoting Steve Downey [EMAIL PROTECTED]: Perhaps you would prefer this exploit? http://localhost:8080/velexample/servlet/org.apache.catalina.servlets.DefaultServlet/sample.vm Horrors! Velocity is insecure! The DefaultServlet exploit is a general security problem in Tomcat. JSP may

DO NOT REPLY [Bug 12968] - [Possible security hole?] package.access security in Catalina/CatalinaService

2002-09-24 Thread bugzilla
/show_bug.cgi?id=12968 [Possible security hole?] package.access security in Catalina/CatalinaService [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW

DO NOT REPLY [Bug 12968] - [Possible security hole?] package.access security in Catalina/CatalinaService

2002-09-24 Thread bugzilla
/show_bug.cgi?id=12968 [Possible security hole?] package.access security in Catalina/CatalinaService [EMAIL PROTECTED] changed: What|Removed |Added Status|RESOLVED

[VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Remy Maucherat
A security vulnerability which affects all releases of Tomcat 4.x has been discovered. It is proposed that new Tomcat 4.0.x and 4.1.x releases are made, at which time the exploit will be publicized. The security advisory will also include an easy workaround to protect existing Tomcat

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Henri Gomez
Tomcat 4.0.5 is virtually indentical to 4.0.4, with the exception of: - a bugfix to URL parsing - the security fix ballot +1 [+1] Yes, I approve this release -1 [ ] No, because: /ballot Which JTC should be used ? Tomcat 4.1.12 Stable release Tomcat

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Glenn Nielsen
Remy Maucherat wrote: A security vulnerability which affects all releases of Tomcat 4.x has been discovered. It is proposed that new Tomcat 4.0.x and 4.1.x releases are made, at which time the exploit will be publicized. The security advisory will also include an easy workaround

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Jean-Francois Arcand
Remy Maucherat wrote: A security vulnerability which affects all releases of Tomcat 4.x has been discovered. It is proposed that new Tomcat 4.0.x and 4.1.x releases are made, at which time the exploit will be publicized. The security advisory will also include an easy workaround

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Remy Maucherat
Henri Gomez wrote: Tomcat 4.0.5 is virtually indentical to 4.0.4, with the exception of: - a bugfix to URL parsing - the security fix ballot +1 [+1] Yes, I approve this release -1 [ ] No, because: /ballot Which JTC should be used ? I bundled the latest JTC binaries for Coyote HTTP

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Patrick Luby
Remy, Here's my votes. Patrick Tomcat 4.0.5 release ballot +1 [X] Yes, I approve this release -1 [ ] No, because: /ballot Tomcat 4.1.12 Stable release ballot +1 [X] Yes, I approve this release -1 [ ] No, because: /ballot --

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Henri Gomez
Remy Maucherat wrote: Henri Gomez wrote: Tomcat 4.0.5 is virtually indentical to 4.0.4, with the exception of: - a bugfix to URL parsing - the security fix ballot +1 [+1] Yes, I approve this release -1 [ ] No, because: /ballot Which JTC should be used ? I bundled the latest

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Amy Roh
Tomcat 4.0.5 release Tomcat 4.0.5 is virtually indentical to 4.0.4, with the exception of: - a bugfix to URL parsing - the security fix ballot +1 [X] Yes, I approve this release -1 [ ] No, because: /ballot Tomcat 4.1.12 Stable release

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Costin Manolache
Remy Maucherat wrote: A security vulnerability which affects all releases of Tomcat 4.x has been discovered. It is proposed that new Tomcat 4.0.x and 4.1.x releases are made, at which time the exploit will be publicized. The security advisory will also include an easy workaround

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Bill Barker
- Original Message - From: Remy Maucherat [EMAIL PROTECTED] To: Tomcat Developers List [EMAIL PROTECTED] Sent: Monday, September 23, 2002 7:04 AM Subject: [VOTE] [4.0.5] [4.1.12] Security releases A security vulnerability which affects all releases of Tomcat 4.x has been discovered

RE: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Larry Isaacs
-Original Message- From: Remy Maucherat [mailto:[EMAIL PROTECTED]] Sent: Monday, September 23, 2002 10:05 AM To: Tomcat Developers List Subject: [VOTE] [4.0.5] [4.1.12] Security releases A security vulnerability which affects all releases of Tomcat 4.x has been discovered

Re: [VOTE] [4.0.5] [4.1.12] Security releases

2002-09-23 Thread Denis Benoit
On Mon, 23 Sep 2002, Remy Maucherat wrote: Tomcat 4.0.5 release Tomcat 4.0.5 is virtually indentical to 4.0.4, with the exception of: - a bugfix to URL parsing - the security fix ballot +1 [X] Yes, I approve this release -1 [ ] No, because: /ballot Tomcat

DO NOT REPLY [Bug 11934] - web.xml security-constraint is parsed incorrectly

2002-09-09 Thread bugzilla
/show_bug.cgi?id=11934 web.xml security-constraint is parsed incorrectly [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 11934] - web.xml security-constraint is parsed incorrectly

2002-09-09 Thread bugzilla
/show_bug.cgi?id=11934 web.xml security-constraint is parsed incorrectly [EMAIL PROTECTED] changed: What|Removed |Added Status|RESOLVED|REOPENED

DO NOT REPLY [Bug 11934] - web.xml security-constraint is parsed incorrectly

2002-09-09 Thread bugzilla
/show_bug.cgi?id=11934 web.xml security-constraint is parsed incorrectly [EMAIL PROTECTED] changed: What|Removed |Added Status|REOPENED|RESOLVED

DO NOT REPLY [Bug 11934] - web.xml security-constraint is parsed incorrectly

2002-09-09 Thread bugzilla
/show_bug.cgi?id=11934 web.xml security-constraint is parsed incorrectly [EMAIL PROTECTED] changed: What|Removed |Added Status|RESOLVED|REOPENED

DO NOT REPLY [Bug 11934] - web.xml security-constraint is parsed incorrectly

2002-09-09 Thread bugzilla
/show_bug.cgi?id=11934 web.xml security-constraint is parsed incorrectly [EMAIL PROTECTED] changed: What|Removed |Added Status|REOPENED|RESOLVED

reporting security problems

2002-09-07 Thread Christopher Todd
According to the Jakarta website, security problems for Jakarta projects should be reported to [EMAIL PROTECTED] A colleague of mine and I are researching a potential security issue in Tomcat, and I wanted to confirm that we should use [EMAIL PROTECTED] to report the issue, once our research

Re: reporting security problems

2002-09-07 Thread Bill Barker
to [EMAIL PROTECTED], since Apache is strongly committed to closing security holds. However, I'd understand if you choose to post to tomcat-dev as well. - Original Message - From: Christopher Todd [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Saturday, September 07, 2002 4:43 PM Subject

Re: Problem with individual jars and Security Manager in TC4.1.10

2002-09-05 Thread Remy Maucherat
Renato wrote: Hi all, I'm trying to upgrade a production installation running TC 4.0.4 to lastest 4.1.10. So far, so good ( still using Jasper 1 ), but I think there is a problem with the configuration of catalina.policy for individual jar files. On catalina.policy it says to use:

Problem with individual jars and Security Manager in TC4.1.10

2002-09-04 Thread Renato
Hi all, I'm trying to upgrade a production installation running TC 4.0.4 to lastest 4.1.10. So far, so good ( still using Jasper 1 ), but I think there is a problem with the configuration of catalina.policy for individual jar files. On catalina.policy it says to use: grant codeBase

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-31 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-31 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation --- Additional Comments From [EMAIL PROTECTED] 2002-08-31 22:27 --- That sounds great, as long as there isn't a security issue with granting untrusted webapps with class access permission

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-31 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation --- Additional Comments From [EMAIL PROTECTED] 2002-08-31 23:11 --- There was no need to add the permission, it worked fine without it in Tomcat 4.1.10. -- To unsubscribe, e-mail: mailto

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-29 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation --- Additional Comments From [EMAIL PROTECTED] 2002-08-29 12:35 --- Try adding the following permission to your default grant in catalina.policy. java.lang.RuntimePermission

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-29 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation --- Additional Comments From [EMAIL PROTECTED] 2002-08-29 16:55 --- Actually I needed to add this slightly different permission to address the problem: permission java.lang.RuntimePermission

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-29 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation --- Additional Comments From [EMAIL PROTECTED] 2002-08-30 02:51 --- What version of the JVM are you using. How accessClassInPackage and defineClassInPackage work changed from Java 1.3 to Java

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-29 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation --- Additional Comments From [EMAIL PROTECTED] 2002-08-30 04:44 --- I'm using Sun JDK 1.3.1_04. -- To unsubscribe, e-mail: mailto:[EMAIL PROTECTED] For additional commands, e-mail: mailto

DO NOT REPLY [Bug 12101] - SecurityManager + unprivileged call to getParameter() = Security Violation

2002-08-28 Thread bugzilla
/show_bug.cgi?id=12101 SecurityManager + unprivileged call to getParameter() = Security Violation [EMAIL PROTECTED] changed: What|Removed |Added Summary|SecurityManager + removal

DO NOT REPLY [Bug 11934] New: - web.xml security-constraint is parsed incorrectly

2002-08-22 Thread bugzilla
/show_bug.cgi?id=11934 web.xml security-constraint is parsed incorrectly Summary: web.xml security-constraint is parsed incorrectly Product: Tomcat 4 Version: 4.1.9 Platform: PC OS/Version: Windows NT/2K Status: NEW Severity: Normal

cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs security-manager-howto.xml

2002-08-17 Thread glenn
glenn 2002/08/17 17:54:48 Modified:webapps/tomcat-docs security-manager-howto.xml Log: Update security docs for pending release Revision ChangesPath 1.3 +68 -63 jakarta-tomcat-4.0/webapps/tomcat-docs/security-manager-howto.xml Index: security-manager

DO NOT REPLY [Bug 11603] - security fails for http-method != GET when user is forced to login

2002-08-11 Thread bugzilla
/show_bug.cgi?id=11603 security fails for http-method != GET when user is forced to login --- Additional Comments From [EMAIL PROTECTED] 2002-08-11 22:46 --- Typo - auth-constraint -- To unsubscribe, e-mail: mailto:[EMAIL PROTECTED] For additional commands, e-mail: mailto:[EMAIL PROTECTED]

DO NOT REPLY [Bug 11603] - security fails for http-method != GET when user is forced to login

2002-08-11 Thread bugzilla
/show_bug.cgi?id=11603 security fails for http-method != GET when user is forced to login --- Additional Comments From [EMAIL PROTECTED] 2002-08-12 01:00 --- I tested WebLogic 6.1 sp2 and it does the same thing that Tomcat does. It allows the GET after you login (that I think should

DO NOT REPLY [Bug 11603] New: - security fails for http-method != GET when user is forced to login

2002-08-10 Thread bugzilla
/show_bug.cgi?id=11603 security fails for http-method != GET when user is forced to login Summary: security fails for http-method != GET when user is forced to login Product: Tomcat 4 Version: 4.0.4 Final Platform: Other URL

DO NOT REPLY [Bug 11603] - security fails for http-method != GET when user is forced to login

2002-08-10 Thread bugzilla
/show_bug.cgi?id=11603 security fails for http-method != GET when user is forced to login [EMAIL PROTECTED] changed: What|Removed |Added URL|http://www.secuityfilter.org|http

Patch for security problem

2002-07-27 Thread John Holman
Bug 11210 (http://nagoya.apache.org/bugzilla/show_bug.cgi?id=11210) is a security problem which could have serious effects for people using JNDIRealm with the Netscape/iPlanet JNDI LDAP provider (com.netscape.jndi.ldap.LdapContextFactory). The default provider

DO NOT REPLY [Bug 11076] New: - Security grants are not recognized by all loaded classes

2002-07-23 Thread bugzilla
/show_bug.cgi?id=11076 Security grants are not recognized by all loaded classes Summary: Security grants are not recognized by all loaded classes Product: Tomcat 4 Version: 4.0.3 Final Platform: PC OS/Version: Linux Status: NEW

DO NOT REPLY [Bug 11076] - Security grants are not recognized by all loaded classes

2002-07-23 Thread bugzilla
/show_bug.cgi?id=11076 Security grants are not recognized by all loaded classes --- Additional Comments From [EMAIL PROTECTED] 2002-07-23 10:33 --- Created an attachment (id=2449) The example files (zip archive) -- To unsubscribe, e-mail: mailto:[EMAIL PROTECTED] For additional commands

DO NOT REPLY [Bug 11076] - Security grants are not recognized by all loaded classes

2002-07-23 Thread bugzilla
/show_bug.cgi?id=11076 Security grants are not recognized by all loaded classes [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 11076] - Security grants are not recognized by all loaded classes

2002-07-23 Thread bugzilla
/show_bug.cgi?id=11076 Security grants are not recognized by all loaded classes [EMAIL PROTECTED] changed: What|Removed |Added Status|RESOLVED|CLOSED

DO NOT REPLY [Bug 7052] - Security manager not initialised or accessed properly

2002-07-23 Thread bugzilla
/show_bug.cgi?id=7052 Security manager not initialised or accessed properly [EMAIL PROTECTED] changed: What|Removed |Added CC||[EMAIL PROTECTED

DO NOT REPLY [Bug 10902] - package.access security check too general for Jasper - precompiled JSPs get package-access violation

2002-07-19 Thread bugzilla
/show_bug.cgi?id=10902 package.access security check too general for Jasper - precompiled JSPs get package-access violation [EMAIL PROTECTED] changed: What|Removed |Added Status

DO NOT REPLY [Bug 10902] - package.access security check too general for Jasper - precompiled JSPs get package-access violation

2002-07-19 Thread bugzilla
/show_bug.cgi?id=10902 package.access security check too general for Jasper - precompiled JSPs get package-access violation [EMAIL PROTECTED] changed: What|Removed |Added Status

DO NOT REPLY [Bug 10902] - package.access security check too general for Jasper - precompiled JSPs get package-access violation

2002-07-18 Thread bugzilla
/show_bug.cgi?id=10902 package.access security check too general for Jasper - precompiled JSPs get package-access violation [EMAIL PROTECTED] changed: What|Removed |Added Status

DO NOT REPLY [Bug 10902] - package.access security check too general for Jasper - precompiled JSPs get package-access violation

2002-07-18 Thread bugzilla
/show_bug.cgi?id=10902 package.access security check too general for Jasper - precompiled JSPs get package-access violation --- Additional Comments From [EMAIL PROTECTED] 2002-07-18 16:25 --- precompiling a simple JSP containing only hello world gives the following (note the references

DO NOT REPLY [Bug 10902] - package.access security check too general for Jasper - precompiled JSPs get package-access violation

2002-07-18 Thread bugzilla
/show_bug.cgi?id=10902 package.access security check too general for Jasper - precompiled JSPs get package-access violation --- Additional Comments From [EMAIL PROTECTED] 2002-07-18 16:40 --- Instead of Tomcat trying to fine tune the package access rules, why not just add the following

DO NOT REPLY [Bug 10902] - package.access security check too general for Jasper - precompiled JSPs get package-access violation

2002-07-18 Thread bugzilla
/show_bug.cgi?id=10902 package.access security check too general for Jasper - precompiled JSPs get package-access violation --- Additional Comments From [EMAIL PROTECTED] 2002-07-18 17:45 --- Yes, adding the line permission java.lang.RuntimePermission

DO NOT REPLY [Bug 10902] New: - package.access security check too general for Jasper - precompiled JSPs get package-access violation

2002-07-17 Thread bugzilla
/show_bug.cgi?id=10902 package.access security check too general for Jasper - precompiled JSPs get package-access violation Summary: package.access security check too general for Jasper - precompiled JSPs get package-access violation Product: Tomcat 4

DO NOT REPLY [Bug 10595] New: - Security Constraints not processed according to spec.

2002-07-09 Thread bugzilla
/show_bug.cgi?id=10595 Security Constraints not processed according to spec. Summary: Security Constraints not processed according to spec. Product: Tomcat 4 Version: 4.1.7 Platform: All OS/Version: All Status: NEW Severity: Normal

Tomcat 4.0 Security problem

2002-07-05 Thread Artur Jonak
Hi, I've got the following error when I try to create LoginContext in my servlet. What should I do? java.lang.SecurityException: Sealing violation loading javax.naming.Context : Package javax.naming is sealed. at

DO NOT REPLY [Bug 10171] New: - MIME types of the files residing within a security realm do not seem to properly return to the Internet Explorer.

2002-06-24 Thread bugzilla
/show_bug.cgi?id=10171 MIME types of the files residing within a security realm do not seem to properly return to the Internet Explorer. Summary: MIME types of the files residing within a security realm do not seem to properly return to the Internet Explorer

DO NOT REPLY [Bug 10171] - MIME types of the files residing within a security realm do not seem to properly return to the Internet Explorer.

2002-06-24 Thread bugzilla
/show_bug.cgi?id=10171 MIME types of the files residing within a security realm do not seem to properly return to the Internet Explorer. [EMAIL PROTECTED] changed: What|Removed |Added

DO NOT REPLY [Bug 10064] - Tomcat nt service does not use security manager

2002-06-21 Thread bugzilla
/show_bug.cgi?id=10064 Tomcat nt service does not use security manager [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

I can't startup tomcat 4.0.3 with security option

2002-06-14 Thread paolo
I' ve installed tomcat 4.0.3 on Linux 7.2 and I try to start with security option but It doesn't work: the error message is: Catalina.start: java.security.AccessControlException: access denied (java.io.FilePermission /var/tomcat4/conf/server.xml read) server.xml is tomcat4.tomcat4 for owner

DO NOT REPLY [Bug 9344] New: - Security risk at HttpSessionEvent Source

2002-05-23 Thread bugzilla
/show_bug.cgi?id=9344 Security risk at HttpSessionEvent Source Summary: Security risk at HttpSessionEvent Source Product: Tomcat 4 Version: 4.0.4 Beta 3 Platform: Other OS/Version: Other Status: NEW Severity: Normal Priority

DO NOT REPLY [Bug 9344] - Security risk at HttpSessionEvent Source

2002-05-23 Thread bugzilla
/show_bug.cgi?id=9344 Security risk at HttpSessionEvent Source [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED Resolution

DO NOT REPLY [Bug 9023] New: - Servlet Container does not convert the roles, which wherer specified in the Element security-role-ref

2002-05-13 Thread bugzilla
/show_bug.cgi?id=9023 Servlet Container does not convert the roles, which wherer specified in the Element security-role-ref Summary: Servlet Container does not convert the roles, which wherer specified in the Element security-role-ref Product: Tomcat 4

cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs security-manager-howto.xml

2002-05-13 Thread glenn
glenn 02/05/13 07:29:36 Modified:webapps/tomcat-docs security-manager-howto.xml Log: Remove codebase trailing \!/-, only needed for jar: URL's Revision ChangesPath 1.2 +3 -3 jakarta-tomcat-4.0/webapps/tomcat-docs/security-manager-howto.xml Index

DO NOT REPLY [Bug 9023] - Servlet Container does not convert the roles, which wherer specified in the Element security-role-ref

2002-05-13 Thread bugzilla
/show_bug.cgi?id=9023 Servlet Container does not convert the roles, which wherer specified in the Element security-role-ref [EMAIL PROTECTED] changed: What|Removed |Added Status

DO NOT REPLY [Bug 9023] - Servlet Container does not convert the roles, which wherer specified in the Element security-role-ref

2002-05-13 Thread bugzilla
/show_bug.cgi?id=9023 Servlet Container does not convert the roles, which wherer specified in the Element security-role-ref --- Additional Comments From [EMAIL PROTECTED] 2002-05-14 01:04 --- *** Bug 9027 has been marked as a duplicate of this bug. *** -- To unsubscribe, e-mail: mailto

DO NOT REPLY [Bug 7092] - socket error while trying write to response.getOutputStream() with security-constraint on servlet

2002-04-29 Thread bugzilla
/show_bug.cgi?id=7092 socket error while trying write to response.getOutputStream() with security-constraint on servlet [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW

[SECURITY] Cross site scripting vulnerability revealed in 'examples' webapp of Apache Tomcat

2002-04-09 Thread Remy Maucherat
Cross Site scripting security vulnerabilities exist in the 'examples' web application which is distributed along with Apache Tomcat. This affects all released versions of Tomcat, including 3.x and 4.x. No other components of Tomcat are currently known to be vulnerable to cross site scripting

DO NOT REPLY [Bug 7532] New: - App init problems results in Severe Security Exposure

2002-03-27 Thread bugzilla
/show_bug.cgi?id=7532 App init problems results in Severe Security Exposure Summary: App init problems results in Severe Security Exposure Product: Tomcat 4 Version: 4.0.3 Final Platform: PC OS/Version: Windows NT/2K Status: NEW

DO NOT REPLY [Bug 7540] New: - Tomcat 4.0.3 fails with -security

2002-03-27 Thread bugzilla
/show_bug.cgi?id=7540 Tomcat 4.0.3 fails with -security Summary: Tomcat 4.0.3 fails with -security Product: Tomcat 4 Version: 4.0.3 Final Platform: PC OS/Version: Windows NT/2K Status: NEW Severity: Critical Priority: Other

DO NOT REPLY [Bug 7540] - Tomcat 4.0.3 fails with -security

2002-03-27 Thread bugzilla
/show_bug.cgi?id=7540 Tomcat 4.0.3 fails with -security [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED Resolution

DO NOT REPLY [Bug 7532] - App init problems results in Severe Security Exposure

2002-03-27 Thread bugzilla
/show_bug.cgi?id=7532 App init problems results in Severe Security Exposure [EMAIL PROTECTED] changed: What|Removed |Added Severity|Major |Enhancement

Security Limitation

2002-03-26 Thread Maksym Gryevtsov
Hi all, There is a limitation on quantity of web-resource-collection elements in web.xml (Tomcat 3.2 - 3.3). I received a ArrayIndexOfBoundsException when try to add more. I have about 30 elements right now. It's look like Tomcat keep these elements in a fixed size array. Hope for fixing

DO NOT REPLY [Bug 7052] - Security manager not initialised or accessed properly

2002-03-20 Thread bugzilla
/show_bug.cgi?id=7052 Security manager not initialised or accessed properly [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 7052] - Security manager not initialised or accessed properly

2002-03-20 Thread bugzilla
/show_bug.cgi?id=7052 Security manager not initialised or accessed properly [EMAIL PROTECTED] changed: What|Removed |Added Status|RESOLVED|CLOSED

DO NOT REPLY [Bug 7092] - socket error while trying write to response.getOutputStream() with security-constraint on servlet

2002-03-14 Thread bugzilla
/show_bug.cgi?id=7092 socket error while trying write to response.getOutputStream() with security-constraint on servlet [EMAIL PROTECTED] changed: What|Removed |Added Component|HTTP

<    1   2   3   4   5   6   >