craigmcc    00/12/12 13:01:42

  Modified:    src/doc  Tag: tomcat_32 readme
  Log:
  Update release notes for Tomcat 3.2.1.
  
  Revision  Changes    Path
  No                   revision
  
  
  No                   revision
  
  
  1.8.2.11  +43 -1     jakarta-tomcat/src/doc/readme
  
  Index: readme
  ===================================================================
  RCS file: /home/cvs/jakarta-tomcat/src/doc/readme,v
  retrieving revision 1.8.2.10
  retrieving revision 1.8.2.11
  diff -u -r1.8.2.10 -r1.8.2.11
  --- readme    2000/12/04 18:47:05     1.8.2.10
  +++ readme    2000/12/12 21:01:41     1.8.2.11
  @@ -1,4 +1,4 @@
  -$Id: readme,v 1.8.2.10 2000/12/04 18:47:05 craigmcc Exp $
  +$Id: readme,v 1.8.2.11 2000/12/12 21:01:41 craigmcc Exp $
   
                               Release Notes for:
                              ====================
  @@ -14,6 +14,7 @@
       4.  Tomcat: Past, Present, and Future
       5.  New Features In This Release
       6.  Known Bugs and Issues
  +    7.  Security Vulnerabilities Fixed in 3.2.1
   
   
   =============================================================================
  @@ -29,7 +30,17 @@
   You should read the License Agreement (in the LICENSE file of the top level
   directory), which applies to all software included in this release.
   
  +Tomcat Version 3.2.1 is a security related update!  See Section 7, below,
  +for details on the changes that have been made.  All other existing issues with
  +Tomcat 3.2 will remain in 3.2.1 -- they will be addressed in subsequent
  +maintenance updates (3.2.2, and so on).
  +
  +No changes to the native code components of Tomcat 3.2 have been made.
  +Therefore, you should *not* need to recompile components such as mod_jserv
  +in order to take advantage of this release.  You only need to replace the
  +Java based modules in the "jakarta-tomcat-3.2.*" distribution.
   
  +
   =============================================================================
   2.  INSTALLING AND RUNNING TOMCAT
   
  @@ -287,4 +298,35 @@
   
   Workaround:  kill the offending Tomcat process and correct your server.xml
   file such that there is a properly configured root context.
  +
  +
  +===============================================================================
  +7.  SECURITY VULNERABILITIES FIXED IN TOMCAT 3.2.1
  +
  +
  +7.1 Protection of Resources in /WEB-INF and /META-INF Directories
  +
  +The servlet specification prohibits servlet containers from serving resources
  +in the /WEB-INF and /META-INF directories of a web application archive directly
  +to clients.  In Tomcat 3.2, this means that URLs like:
  +
  +   http://localhost:8080/examples/WEB-INF/web.xml
  +
  +will return an error message, rather than the contents of your deployment
  +descriptor.  However, there is a vulnerability in Tomcat 3.2 that exposes
  +this information if the client requests a URL like this instead:
  +
  +    http://localhost:8080/examples//WEB-INF/web.xml
  +
  +(note the double slash before "WEB-INF").  This vulnerability has been
  +corrected in Tomcat 3.2.1.
  +
  +
  +7.2 Show Source Vulnerability
  +
  +The example application delivered with Tomcat 3.2 included a mechanism to
  +display the source code for the JSP page examples.  This mechanism could
  +be used to bypass the restrictions on displaying sensitive information in
  +the WEB-INF and META-INF directories.  This vulnerability has been removed.
  +
   
  
  
  

Reply via email to