Hi Mark,

> -----Original Message-----
> From: Mark Thomas [mailto:ma...@apache.org]
> Sent: Tuesday, May 27, 2014 4:33 PM

<snip>

> Yes, you need to have a content-length above Long.MAX_VALUE for
> problems
> to occur. That would be unusual to say the least for most (all?)
> applications in normal usage but easy for a malicious user to set.
> 
> If the proxy handles the header correctly, the attacker is going to have
> to send a *lot* of data to get this to work. Where things would get
> interesting is if the proxy and Tomcat both had parsing issues but ended
> up with different values. That would make request smuggling a lot easier.
> 
> Something else to consider. If an attacker can trigger this
> "request/response offset" then any subsequent requests they make could
> receive responses that contain data from other users. Even if they can't
> control what that data is, that is still information disclosure.

OK, thanks for the clarification!


Regards,
Konstantin Preißer


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to