Hi Remy,

> As I stated in the comments of the bug, I don't agree with your
> interpretation about the JSP displaying "code".

Sorry again for not making myself clear. To put it exact (I hope ...):

There are cases in complex include/forward scenarios where Tomcat serves
JSPs as static resources. So the *client browser* receives something like
this as plain text:


<%@page language="java" %>

<%
 application.getRequestDispatcher("/html/test.html").forward(request,
response);
%>

<%-- possible harmful information like database login information etc. may
also appear here --%>


This was what I referred to as "JSP source code". After reading your comment
I noticed how ambiguous that was (sorry again). Now the question is: Is it
dangerous if the client sees a JSP including all embedded scriptlets? I'd
say yes since developers usually rely upon their Java/JSP code not visible
to clients (e.g. because database username and password
are stored there - and let's not argue whether this is good design ;-)).

Best regards

  Andreas

PS Thanks for incorporating the patch that changes the shutdown order in
StandardContext.



--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to