tomcat-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Christopher Schultz <ch...@christopherschultz.net>
Subject Re: How to reproduce tomcat security vulnerabilities
Date Wed, 22 Sep 2010 18:25:26 GMT
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Viola,

On 9/21/2010 10:13 PM, viola lu wrote:
> Here is my client:

[snip]

Note that your client can be replaced by this one-liner:

$ wget -S -O - --header='Transfer-Encoding: unsupported' \
       --post-data='test send post' \
       http://localhost:8080/SecurityTomcat/SecurityServlet

It also has the added advantages of not stripping newlines from the
response, and including the response headers in the output.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkyaShYACgkQ9CaO5/Lv0PBzFgCeMVSEXNtPhBFe0ae+M3Ip0aOT
6SgAnAihZq7v3w6icGiPeceYFjnAPN21
=LoyH
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org
For additional commands, e-mail: users-help@tomcat.apache.org


Mime
View raw message