On 07/12/2009 04:53, Saw Chee Hong wrote:
I seen this at one of apache website.

*[Summary]*
Apache Tomcat is prone to an insecure-password vulnerability in the Windows
installer.  The administrative password defaults to a blank password during
the install process.

Attackers may exploit this issue to obtain administrative access to the
application.  Other attacks may also be possible.
*
[Affected Version]*
Tomcat 6.0.0 through 6.0.20 and Tomcat 5.5.0 through 5.5.28 are vulnerable;
Unsupported versions in the 3.x, 4.x, 4.1.x, and 5.0.x branches may also be
affected.

*
[Solution/Workaround]*

The following workarounds are available:

1. Install the application via the .zip or .tar.gz distributions instead of
using the Windows installer method.

2. Remove the 'admin' user from 'tomcat-users.xml' after the Windows
installer has completed.

3. Edit the 'tomcat-users.xml' file to provide the 'admin' user with a
strong password after the Windows installer has completed.

Currently mytomcat version was 5.0.27. I have check the ‘tomcat-users.xml’
file and it doesn’t consist the ‘admin’ user in the file.

Then you are not at risk from *this particular* issue.

Does this mean that my tomcat is safe?

No idea. That's too open ended a question - we can't tell what else you've done to it.


p


Thank you for answering my question.

Best Regards,
Saw Chee Hong



---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to