James,

On 8/24/21 17:20, James H. H. Lampert wrote:
I could have sworn I asked about this over a year ago, but I can't find any record of having done so.

We've got a low-priority complaint about a security scan looking for "test.jsp" on one of our installations, expecting a 404 response, and instead getting a 200 response and a redirect to our own error page.

Just a sanity check: this *is* a problem with our ROOT context, not with Tomcat itself, right? And it has to be solved within our ROOT context, right?

My guess is that the vuln scanner assumes that "GET test.jsp" returning a 200 response means "it's got something bad in there". They are probably thinking about a *specific* test.jsp file, but you just happen to have one, probably as part of your application.

If you haven't deployed any of Tomcat's "example", "docs", or ROOT applications (meaning, the ROOT webapp that hosts Tomcat's documentation and stuff), then yes, this complaint is being aimed at your application.

You should probably be able to find test.jsp on your disk, or in your WAR file if for some reason you aren't exploding WAR files on deployment.

Go read the source for that file and maybe it will give you some insight as to where it came from.

-chris

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to