DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=6279>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=6279

Resubmit to j_security_check mistakenly fetches a page of that name

[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Priority|Medium                      |Low



------- Additional Comments From [EMAIL PROTECTED]  2002-06-06 09:37 -------
I was the original submitter. Some of what I said was misplaced. Even if the
code was changed as I describe to allow users to log in again, it wouldnt work.
This is because the request is still for j_security_check. The request would now
fail with an SC_BAD_REQUEST - exactly as you would get if you bookmarked the
login page.

That issue - that the user has actually managed to log in, but we dont know what
page to take them to - can not be solved portably across servlet engines under
the spec. Currently I get round it on tomcat by trapping the 400 error and
taking the user to an appropriate page, because there are few other places where
400 errors are thrown (in the Certificate auth and WebDav code). When JSR 154
(servlet 2.4) goes to public review (later this month, hopefully) I'm going to
request that a specific exception is thrown in this case, to provide a portable
way to trap the error.

****WARNING****

A further issue with the fix I posted is that the user changes within the same
session. This is a SECURITY HOLE. Details from one user may leak to a second
user through reuse of the session. The session must be closed and a new session
opened if the user logs in with new credentials.

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to