On 22/11/2012 15:11, David Kerber wrote:
> On 11/22/2012 8:35 AM, Aditi Sinha wrote:
>> Thanks Guys.
>>
>> As per my reading of the suggested material and looking at the logs that
>> Andre has shared, I think there are two ways in which the directory
>> traversal attack could be made.
>>
>> 1. By having ..\ equivalents in the URL itself
>> 2. By having ..\ equivalents in the request parameters.
>>
>> In my case, I am not worried about the request parameters since my
>> application doesn't handle any such path related queries and all request
>> parameters are signed by our client app.
>>
>> So, It would really help me narrow down on a course of action ff you guys
>> can tell me  -
>>
>> *Whether someone can get access to any file/directory outside the tomcat
>> webapps folder using "Style 1 (using ..\ equivalent in the URL itself)
>>   Directory traversal attack (scoped to Tomcat) on Windows".*

Have you tried this?

How does Tomcat respond?

> You could certainly block that by ensuring that the user tomcat is
> running under does not have permissions to anything outside the
> directory where your webapp is deployed.

That would provide defence in depth (e.g. in case of poor configuration)
but is not required to prevent directory traversal.

Mark


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to