Return-Path: Delivered-To: apmail-geronimo-dev-archive@www.apache.org Received: (qmail 83905 invoked from network); 23 Jul 2008 20:54:28 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 23 Jul 2008 20:54:28 -0000 Received: (qmail 11571 invoked by uid 500); 23 Jul 2008 20:54:26 -0000 Delivered-To: apmail-geronimo-dev-archive@geronimo.apache.org Received: (qmail 11510 invoked by uid 500); 23 Jul 2008 20:54:25 -0000 Mailing-List: contact dev-help@geronimo.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: Reply-To: dev@geronimo.apache.org List-Id: Delivered-To: mailing list dev@geronimo.apache.org Received: (qmail 11498 invoked by uid 99); 23 Jul 2008 20:54:25 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 23 Jul 2008 13:54:25 -0700 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 23 Jul 2008 20:53:36 +0000 Received: from brutus (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id D1296234C177 for ; Wed, 23 Jul 2008 13:53:31 -0700 (PDT) Message-ID: <961740813.1216846411842.JavaMail.jira@brutus> Date: Wed, 23 Jul 2008 13:53:31 -0700 (PDT) From: "Joe Bohn (JIRA)" To: dev@geronimo.apache.org Subject: [jira] Updated: (GERONIMO-3549) Potential vulnerability in Apache Tomcat Webdav servlet In-Reply-To: <25835238.1193190290877.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/GERONIMO-3549?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Joe Bohn updated GERONIMO-3549: ------------------------------- Affects Version/s: (was: 2.0.x) Fix Version/s: (was: 2.0.x) 2.0.3 > Potential vulnerability in Apache Tomcat Webdav servlet > ------------------------------------------------------- > > Key: GERONIMO-3549 > URL: https://issues.apache.org/jira/browse/GERONIMO-3549 > Project: Geronimo > Issue Type: Bug > Security Level: public(Regular issues) > Components: Tomcat > Affects Versions: 1.1.1, 1.2, 2.0, 2.0.1, 2.0.2, 2.1 > Reporter: Donald Woods > Assignee: Jay D. McHugh > Fix For: 2.0.3, 2.1 > > > Subject: [SECURITY] Potential vulnerability in Apache Tomcat Webdav servlet > Date: Thu, 18 Oct 2007 13:40:24 -0400 > From: Kevan Miller > Reply-To: dev@geronimo.apache.org > To: Geronimo Dev > The Geronimo project has learned of a security vulnerability in the > Apache Tomcat Webdav Servlet implementation. If you use a Tomcat > configuration of Geronimo and configure a write-enabled Webdav servlet, > you may be affected by this vulnerability. If you do not configure the > Webdav servlet or configure read-only Webdav servlets, you are not > impacted by this vulnerability. Jetty configurations of Geronimo are not > affected by this vulnerability. > This vulnerability impacts all Geronimo releases. Up to and including > Geronimo 2.0.2. > For specific information regarding the Tomcat issue, see http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3c47135C2D.1000705@apache.org%3e > By default, Geronimo releases do not use the Webdav servlet. However, it > is possible for the Webdav Servlet to be configured or referenced by a > user-written application. > The Webdav Servlet could be explicitly configured in a web.xml > deployment descriptor as follows: > ... > > webdav > org.apache.catalina.servlets.WebdavServlet > > readonly > false > > > Alternatively, a user's application could extend the WebdavServlet, for > example: > import org.apache.catalina.servlets.WebdavServlet; > public class MyServlet extends WebdavServlet { > ... > > If you configure a write-enabled Webdav servlet, we recommend that you: > - Disable write access to the Webdav Servlet until this problem has > been fixed, or > - Limit access to the Webdav servlet to only trusted users. > This vulnerability will be fixed in the next release of Geronimo (2.0.3 > and/or 2.1). > --kevan -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.