Bug report #682 has just been filed.

You can view the report at the following URL:

   <http://znutar.cortexity.com/BugRatViewer/ShowReport/682>

REPORT #682 Details.

Project: Catalina
Category: Bug Report
SubCategory: New Bug Report
Class: swbug
State: received
Priority: high
Severity: critical
Confidence: public
Environment: 
   Release: m5
   JVM Release: ANY
   Operating System: ANY
   OS Release: ANY
   Platform: ANY

Synopsis: 
Security Issue? Important attributes exposed by ServletContext can be modified

Description:
Hi:

  The attributes such as "org.apache.catalina.classloader", 
"org.apache.catalina.jsp_classpath" are exposed through ServletContext and can be 
easily modified. No security violation is generated and anybody with an application 
installed on the web server can modify these variables. Is n't it a security problem 
for Tomcat?

Thanks
-Ramesh
Title: BugRat Report # 682

BugRat Report # 682

Project: Catalina Release: m5
Category: Bug Report SubCategory: New Bug Report
Class: swbug State: received
Priority: high Severity: critical
Confidence: public

Submitter: Ramesh. Mandava ( [EMAIL PROTECTED] )
Date Submitted: Jan 1 2001, 10:52:11 CST
Responsible: Z_Tomcat Alias ( [EMAIL PROTECTED] )

Synopsis:
Security Issue? Important attributes exposed by ServletContext can be modified
Environment: (jvm, os, osrel, platform)
ANY, ANY, ANY, ANY

Additional Environment Description:

Report Description:
Hi: The attributes such as "org.apache.catalina.classloader", "org.apache.catalina.jsp_classpath" are exposed through ServletContext and can be easily modified. No security violation is generated and anybody with an application installed on the web server can modify these variables. Is n't it a security problem for Tomcat? Thanks -Ramesh

View this report online...
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, email: [EMAIL PROTECTED]

Reply via email to