-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Rémy,

On 6/4/2009 1:04 PM, Rémy Maucherat wrote:
> On Thu, Jun 4, 2009 at 6:48 PM, Christopher Schultz
> <ch...@christopherschultz.net> wrote:
>> I don't see any information disclosure vulnerability in the first place,
>> and I don't see how your patch would have fixed it.
>>
>> ??!
> 
> The behavior was different if the user is not found of if the password is 
> wrong.
> (ok, the security issue is not exactly very serious)

To be sure, this is not very serious, but this method should return null
in all cases except for successful authentication. Under what conditions
would something non-null be returned if the authentication wasn't
successful?

I don't think an exception would be thrown, either, would it?

On 6/4/2009 2:06 PM, Len Popp wrote:
> It looks to me like the change fixes an NPE when a null or nonsense
> password is given.

That would certainly amount to an information disclosure, but I'm
reading the 5.5 trunk source
(http://svn.apache.org/viewvc/tomcat/container/tc5.5.x/catalina/src/share/org/apache/catalina/realm/DataSourceRealm.java?revision=466608&pathrev=781379
: version just previous to the fix) and it looks like you'd get an NPE
whether the user was found in the database or not.

I suppose the argument could be made that sloppy credential handling
(that is, sloppy enough to allow an NPE) could possibly lead to such
information disclosure.

Time to go check-out securityfilter's source to see if we do this. Oh,
wait, we use Tomcat's realms :)

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkoog3gACgkQ9CaO5/Lv0PC+eQCgnQAZd4epH+5myPBWea4AR8FC
RDoAoKOuCrFk+Pgc653p15qTkqC1kqVx
=tICL
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to