You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tomcat.apache.org by kk...@apache.org on 2020/02/13 15:24:18 UTC

svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/

Modified: tomcat/site/trunk/docs/security-4.html
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?rev=1873980&r1=1873979&r2=1873980&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Thu Feb 13 15:24:17 2020
@@ -1,278 +1,10 @@
 <!DOCTYPE html SYSTEM "about:legacy-compat">
-<html lang="en">
-<head>
-<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
-<meta name="viewport" content="width=device-width, initial-scale=1">
-<link href="res/css/tomcat.css" rel="stylesheet" type="text/css">
-<link href="res/css/fonts/fonts.css" rel="stylesheet" type="text/css">
-<title>Apache Tomcat&reg; - Apache Tomcat 4.x vulnerabilities</title>
-<meta name="author" content="Apache Tomcat Project">
-</head>
-<body>
-<div id="wrapper">
-<header id="header">
-<div class="clearfix">
-<div class="menu-toggler pull-left" tabindex="1">
-<div class="hamburger"></div>
-</div>
-<a href="http://tomcat.apache.org/"><img class="tomcat-logo pull-left noPrint" alt="Tomcat Home" src="res/images/tomcat.png"></a>
-<h1 class="pull-left">Apache Tomcat<sup>&reg;</sup>
-</h1>
-<div class="asf-logos pull-right">
-<a href="https://www.apache.org/foundation/contributing.html" target="_blank" class="pull-left"><img src="https://www.apache.org/images/SupportApache-small.png" class="support-asf" alt="Support Apache"></a><a href="http://www.apache.org/" target="_blank" class="pull-left"><img src="res/images/asf_logo.svg" class="asf-logo" alt="The Apache Software Foundation"></a>
-</div>
-</div>
-</header>
-<main id="middle">
-<div>
-<div id="mainLeft">
-<div id="nav-wrapper">
-<form action="https://www.google.com/search" method="get">
-<div class="searchbox">
-<input value="tomcat.apache.org" name="sitesearch" type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" required="required" name="q" id="query" type="search"><button>GO</button>
-</div>
-</form>
-<div class="asfevents">
-<a href="https://www.apache.org/events/current-event.html"><img src="https://www.apache.org/events/current-event-234x60.png" alt="Next ASF event"><br>
+<html lang="en"><head><META http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat 4.x vulnerabilities</title><meta name="author" content="Apache Tomcat Project"></head><body><div id="wrapper"><header id="header"><div class="clearfix"><div class="menu-toggler pull-left" tabindex="1"><div class="hamburger"></div></div><a href="http://tomcat.apache.org/"><img class="tomcat-logo pull-left noPrint" alt="Tomcat Home" src="res/images/tomcat.png"></a><h1 class="pull-left">Apache Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a href="https://www.apache.org/foundation/contributing.html" target="_blank" class="pull-left"><img src="https://www.apache.org/images/SupportApache-small.png" class="support-asf" alt="Support Apache"></a><a
  href="http://www.apache.org/" target="_blank" class="pull-left"><img src="res/images/asf_logo.svg" class="asf-logo" alt="The Apache Software Foundation"></a></div></div></header><main id="middle"><div><div id="mainLeft"><div id="nav-wrapper"><form action="https://www.google.com/search" method="get"><div class="searchbox"><input value="tomcat.apache.org" name="sitesearch" type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" required="required" name="q" id="query" type="search"><button>GO</button></div></form><div class="asfevents"><a href="https://www.apache.org/events/current-event.html"><img src="https://www.apache.org/events/current-event-234x60.png" alt="Next ASF event"><br>
               Save the date!
-            </a>
-</div>
-<nav>
-<div>
-<h2>Apache Tomcat</h2>
-<ul>
-<li>
-<a href="./index.html">Home</a>
-</li>
-<li>
-<a href="./taglibs.html">Taglibs</a>
-</li>
-<li>
-<a href="./maven-plugin.html">Maven Plugin</a>
-</li>
-</ul>
-</div>
-<div>
-<h2>Download</h2>
-<ul>
-<li>
-<a href="./whichversion.html">Which version?</a>
-</li>
-<li>
-<a href="https://tomcat.apache.org/download-90.cgi">Tomcat 9</a>
-</li>
-<li>
-<a href="https://tomcat.apache.org/download-80.cgi">Tomcat 8</a>
-</li>
-<li>
-<a href="https://tomcat.apache.org/download-70.cgi">Tomcat 7</a>
-</li>
-<li>
-<a href="https://tomcat.apache.org/download-connectors.cgi">Tomcat Connectors</a>
-</li>
-<li>
-<a href="https://tomcat.apache.org/download-native.cgi">Tomcat Native</a>
-</li>
-<li>
-<a href="https://tomcat.apache.org/download-taglibs.cgi">Taglibs</a>
-</li>
-<li>
-<a href="https://archive.apache.org/dist/tomcat/">Archives</a>
-</li>
-</ul>
-</div>
-<div>
-<h2>Documentation</h2>
-<ul>
-<li>
-<a href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a>
-</li>
-<li>
-<a href="./tomcat-8.5-doc/index.html">Tomcat 8.5</a>
-</li>
-<li>
-<a href="./tomcat-7.0-doc/index.html">Tomcat 7.0</a>
-</li>
-<li>
-<a href="./connectors-doc/">Tomcat Connectors</a>
-</li>
-<li>
-<a href="./native-doc/">Tomcat Native</a>
-</li>
-<li>
-<a href="https://cwiki.apache.org/confluence/display/TOMCAT">Wiki</a>
-</li>
-<li>
-<a href="./migration.html">Migration Guide</a>
-</li>
-<li>
-<a href="./presentations.html">Presentations</a>
-</li>
-</ul>
-</div>
-<div>
-<h2>Problems?</h2>
-<ul>
-<li>
-<a href="./security.html">Security Reports</a>
-</li>
-<li>
-<a href="./findhelp.html">Find help</a>
-</li>
-<li>
-<a href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ">FAQ</a>
-</li>
-<li>
-<a href="./lists.html">Mailing Lists</a>
-</li>
-<li>
-<a href="./bugreport.html">Bug Database</a>
-</li>
-<li>
-<a href="./irc.html">IRC</a>
-</li>
-</ul>
-</div>
-<div>
-<h2>Get Involved</h2>
-<ul>
-<li>
-<a href="./getinvolved.html">Overview</a>
-</li>
-<li>
-<a href="./source.html">Source code</a>
-</li>
-<li>
-<a href="./ci.html">Buildbot</a>
-</li>
-<li>
-<a href="https://cwiki.apache.org/confluence/x/vIPzBQ">Translations</a>
-</li>
-<li>
-<a href="./tools.html">Tools</a>
-</li>
-</ul>
-</div>
-<div>
-<h2>Media</h2>
-<ul>
-<li>
-<a href="https://twitter.com/theapachetomcat">Twitter</a>
-</li>
-<li>
-<a href="https://www.youtube.com/c/ApacheTomcatOfficial">YouTube</a>
-</li>
-<li>
-<a href="https://blogs.apache.org/tomcat/">Blog</a>
-</li>
-</ul>
-</div>
-<div>
-<h2>Misc</h2>
-<ul>
-<li>
-<a href="./whoweare.html">Who We Are</a>
-</li>
-<li>
-<a href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat">Swag</a>
-</li>
-<li>
-<a href="./heritage.html">Heritage</a>
-</li>
-<li>
-<a href="http://www.apache.org">Apache Home</a>
-</li>
-<li>
-<a href="./resources.html">Resources</a>
-</li>
-<li>
-<a href="./contact.html">Contact</a>
-</li>
-<li>
-<a href="./legal.html">Legal</a>
-</li>
-<li>
-<a href="https://www.apache.org/foundation/contributing.html">Support Apache</a>
-</li>
-<li>
-<a href="https://www.apache.org/foundation/sponsorship.html">Sponsorship</a>
-</li>
-<li>
-<a href="http://www.apache.org/foundation/thanks.html">Thanks</a>
-</li>
-<li>
-<a href="http://www.apache.org/licenses/">License</a>
-</li>
-</ul>
-</div>
-</nav>
-</div>
-</div>
-<div id="mainRight">
-<div id="content">
-<h2 style="display: none;">Content</h2>
-<h3 id="Table_of_Contents">Table of Contents</h3>
-<div class="text">
-
-<ul>
-<li>
-<a href="#Apache_Tomcat_4.x_vulnerabilities">Apache Tomcat 4.x vulnerabilities</a>
-</li>
-<li>
-<a href="#Will_not_be_fixed_in_Apache_Tomcat_4.1.x">Will not be fixed in Apache Tomcat 4.1.x</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.40">Fixed in Apache Tomcat 4.1.40</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.39">Fixed in Apache Tomcat 4.1.39</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.37">Fixed in Apache Tomcat 4.1.37</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.36">Fixed in Apache Tomcat 4.1.36</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.35">Fixed in Apache Tomcat 4.1.35</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.32">Fixed in Apache Tomcat 4.1.32</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.29">Fixed in Apache Tomcat 4.1.29</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.13,_4.0.6">Fixed in Apache Tomcat 4.1.13, 4.0.6</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.12,_4.0.5">Fixed in Apache Tomcat 4.1.12, 4.0.5</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.3">Fixed in Apache Tomcat 4.1.3</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.1.0">Fixed in Apache Tomcat 4.1.0</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.0.2">Fixed in Apache Tomcat 4.0.2</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_4.0.0">Fixed in Apache Tomcat 4.0.0</a>
-</li>
-<li>
-<a href="#Unverified">Unverified</a>
-</li>
-<li>
-<a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a>
-</li>
-</ul>
-
-</div>
-<h3 id="Apache_Tomcat_4.x_vulnerabilities">Apache Tomcat 4.x vulnerabilities</h3>
-<div class="text">
-    
-<p>This page lists all security vulnerabilities fixed in released versions
+            </a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a href="./index.html">Home</a></li><li><a href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a href="./whichversion.html">Which version?</a></li><li><a href="https://tomcat.apache.org/download-90.cgi">Tomcat 9</a></li><li><a href="https://tomcat.apache.org/download-80.cgi">Tomcat 8</a></li><li><a href="https://tomcat.apache.org/download-70.cgi">Tomcat 7</a></li><li><a href="https://tomcat.apache.org/download-connectors.cgi">Tomcat Connectors</a></li><li><a href="https://tomcat.apache.org/download-native.cgi">Tomcat Native</a></li><li><a href="https://tomcat.apache.org/download-taglibs.cgi">Taglibs</a></li><li><a href="https://archive.apache.org/dist/tomcat/">Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a href="./tomcat-8.5-doc/index.html">Tomcat 8.5</a></li><l
 i><a href="./tomcat-7.0-doc/index.html">Tomcat 7.0</a></li><li><a href="./connectors-doc/">Tomcat Connectors</a></li><li><a href="./native-doc/">Tomcat Native</a></li><li><a href="https://cwiki.apache.org/confluence/display/TOMCAT">Wiki</a></li><li><a href="./migration.html">Migration Guide</a></li><li><a href="./presentations.html">Presentations</a></li></ul></div><div><h2>Problems?</h2><ul><li><a href="./security.html">Security Reports</a></li><li><a href="./findhelp.html">Find help</a></li><li><a href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ">FAQ</a></li><li><a href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug Database</a></li><li><a href="./irc.html">IRC</a></li></ul></div><div><h2>Get Involved</h2><ul><li><a href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a href="https://cwiki.apache.org/confluence/x/vIPzBQ">Translations</a></li><li><a href="./tools
 .html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a href="https://twitter.com/theapachetomcat">Twitter</a></li><li><a href="https://www.youtube.com/c/ApacheTomcatOfficial">YouTube</a></li><li><a href="https://blogs.apache.org/tomcat/">Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a href="./whoweare.html">Who We Are</a></li><li><a href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat">Swag</a></li><li><a href="./heritage.html">Heritage</a></li><li><a href="http://www.apache.org">Apache Home</a></li><li><a href="./resources.html">Resources</a></li><li><a href="./contact.html">Contact</a></li><li><a href="./legal.html">Legal</a></li><li><a href="https://www.apache.org/foundation/contributing.html">Support Apache</a></li><li><a href="https://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li><li><a href="http://www.apache.org/foundation/thanks.html">Thanks</a></li><li><a href="http://www.apache.org/licenses/">License</a></li></ul></div></
 nav></div></div><div id="mainRight"><div id="content"><h2 style="display: none;">Content</h2><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
+<ul><li><a href="#Apache_Tomcat_4.x_vulnerabilities">Apache Tomcat 4.x vulnerabilities</a></li><li><a href="#Will_not_be_fixed_in_Apache_Tomcat_4.1.x">Will not be fixed in Apache Tomcat 4.1.x</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.40">Fixed in Apache Tomcat 4.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.39">Fixed in Apache Tomcat 4.1.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.37">Fixed in Apache Tomcat 4.1.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.36">Fixed in Apache Tomcat 4.1.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.35">Fixed in Apache Tomcat 4.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.32">Fixed in Apache Tomcat 4.1.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.29">Fixed in Apache Tomcat 4.1.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.13,_4.0.6">Fixed in Apache Tomcat 4.1.13, 4.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.12,_4.0.5">Fixed in Apache Tomcat 4.1.12, 4.0.5</a></li><li><a href="#Fixed_in
 _Apache_Tomcat_4.1.3">Fixed in Apache Tomcat 4.1.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.1.0">Fixed in Apache Tomcat 4.1.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.0.2">Fixed in Apache Tomcat 4.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_4.0.0">Fixed in Apache Tomcat 4.0.0</a></li><li><a href="#Unverified">Unverified</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul>
+</div><h3 id="Apache_Tomcat_4.x_vulnerabilities">Apache Tomcat 4.x vulnerabilities</h3><div class="text">
+    <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat 4.x. Each vulnerability is given a
        <a href="security-impact.html">security impact rating</a> by the Apache
        Tomcat security team &mdash; please note that this rating may vary from
@@ -280,33 +12,22 @@
        is known to affect, and where a flaw has not been verified list the
        version with a question mark.</p>
 
-    
-<p>
-<strong>Note:</strong> Vulnerabilities that are not Tomcat vulnerabilities
+    <p><strong>Note:</strong> Vulnerabilities that are not Tomcat vulnerabilities
        but have either been incorrectly reported against Tomcat or where Tomcat
        provides a workaround are listed at the end of this page.</p>
 
-    
-<p>Please note that Tomcat 4.0.x and 4.1.x are no longer supported. Further
+    <p>Please note that Tomcat 4.0.x and 4.1.x are no longer supported. Further
        vulnerabilities in the 4.0.x and 4.1.x branches will not be fixed. Users
        should upgrade to 7.x or later to obtain security fixes.</p>
 
-    
-<p>Please send comments or corrections for these vulnerabilities to the
+    <p>Please send comments or corrections for these vulnerabilities to the
        <a href="security.html">Tomcat Security Team</a>.</p>
 
-  
-</div>
-<h3 id="Will_not_be_fixed_in_Apache_Tomcat_4.1.x">Will not be fixed in Apache Tomcat 4.1.x</h3>
-<div class="text">
-    
-<p>
-<strong>Moderate: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4836" rel="nofollow">CVE-2005-4836</a>
-</p>
+  </div><h3 id="Will_not_be_fixed_in_Apache_Tomcat_4.1.x">Will not be fixed in Apache Tomcat 4.1.x</h3><div class="text">
+    <p><strong>Moderate: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4836" rel="nofollow">CVE-2005-4836</a></p>
 
-    
-<p>The deprecated HTTP/1.1 connector does not reject request URIs containing
+    <p>The deprecated HTTP/1.1 connector does not reject request URIs containing
        null bytes when used with contexts that are configured with
        allowLinking="true". Failure to reject the null byte enables an attacker
        to obtain the source for any JSP page in these contexts. Users of Tomcat
@@ -314,142 +35,95 @@
        which does not exhibit this issue. There are no plans to issue an update
        to Tomcat 4.1.x for this issue.</p>
 
-    
-<p>Affects: 4.1.15-4.1.SVN</p>
+    <p>Affects: 4.1.15-4.1.SVN</p>
 
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.40">Fixed in Apache Tomcat 4.1.40</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Information Disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515" rel="nofollow">CVE-2008-5515</a>
-</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.40">Fixed in Apache Tomcat 4.1.40</h3><div class="text">
+    <p><strong>Important: Information Disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515" rel="nofollow">CVE-2008-5515</a></p>
 
-    
-<p>When using a RequestDispatcher obtained from the Request, the target path
+    <p>When using a RequestDispatcher obtained from the Request, the target path
        was normalised before the query string was removed. A request that
        included a specially crafted request parameter could be used to access
        content that would otherwise be protected by a security constraint or by
        locating it in under the WEB-INF directory.</p>
 
-    
-<p>This was fixed in revisions <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=782763">782763</a> and
+    <p>This was fixed in revisions <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=782763">782763</a> and
        <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=783292">783292</a>.</p>
 
-    
-<p>Affects: 4.1.0-4.1.39</p>
+    <p>Affects: 4.1.0-4.1.39</p>
 
-    
-<p>
-<strong>Important: Denial of Service</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033" rel="nofollow">CVE-2009-0033</a>
-</p>
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033" rel="nofollow">CVE-2009-0033</a></p>
 
-    
-<p>If Tomcat receives a request with invalid headers via the Java AJP
+    <p>If Tomcat receives a request with invalid headers via the Java AJP
        connector, it does not return an error and instead closes the AJP
        connection. In case this connector is member of a mod_jk load balancing
        worker, this member will be put into an error state and will be blocked
        from use for approximately one minute. Thus the behaviour can be used for
        a denial of service attack using a carefully crafted request.</p>
 
-    
-<p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=781362">revision 781362</a>.</p>
+    <p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=781362">revision 781362</a>.</p>
 
-    
-<p>Affects: 4.1.0-4.1.39</p>
+    <p>Affects: 4.1.0-4.1.39</p>
  
-    
-<p>
-<strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580" rel="nofollow">CVE-2009-0580</a>
-</p>
+    <p><strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580" rel="nofollow">CVE-2009-0580</a></p>
 
-    
-<p>Due to insufficient error checking in some authentication classes, Tomcat
+    <p>Due to insufficient error checking in some authentication classes, Tomcat
        allows for the enumeration (brute force testing) of user names by
        supplying illegally URL encoded passwords. The attack is possible if FORM
        based authentication (j_security_check) is used with the MemoryRealm.
        Note that in early versions, the DataSourceRealm and JDBCRealm were also
        affected.</p>
 
-    
-<p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=781382">revision 781382</a>.</p>
+    <p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=781382">revision 781382</a>.</p>
 
-    
-<p>Affects: 4.1.0-4.1.39 (Memory Realm), 4.1.0-4.1.31 (JDBC Realm),
+    <p>Affects: 4.1.0-4.1.39 (Memory Realm), 4.1.0-4.1.31 (JDBC Realm),
                 4.1.17-4.1.31 (DataSource Realm)</p>
        
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781" rel="nofollow">CVE-2009-0781</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781" rel="nofollow">CVE-2009-0781</a></p>
 
-    
-<p>The calendar application in the examples web application contains an
+    <p>The calendar application in the examples web application contains an
        XSS flaw due to invalid HTML which renders the XSS filtering protection
        ineffective.</p>
 
-    
-<p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=750927">revision 750927</a>.</p>
+    <p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=750927">revision 750927</a>.</p>
 
-    
-<p>Affects: 4.1.0-4.1.39</p>
+    <p>Affects: 4.1.0-4.1.39</p>
 
-    
-<p>
-<strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" rel="nofollow">CVE-2009-0783</a>
-</p>
+    <p><strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" rel="nofollow">CVE-2009-0783</a></p>
 
-    
-<p>Bugs <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a>
+    <p>Bugs <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a>
        allowed a web application to replace the XML parser used by
        Tomcat to process web.xml and tld files. In limited circumstances these
        bugs may allow a rogue web application to view and/or alter the web.xml
        and tld files of other web applications deployed on the Tomcat instance.
        </p>
 
-    
-<p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=781708">revision 781708</a>.</p>
+    <p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=781708">revision 781708</a>.</p>
 
-    
-<p>Affects: 4.1.0-4.1.39</p>
+    <p>Affects: 4.1.0-4.1.39</p>
        
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.39">Fixed in Apache Tomcat 4.1.39</h3>
-<div class="text">
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.39">Fixed in Apache Tomcat 4.1.39</h3><div class="text">
 
-    
-<p>
-<strong>Moderate: Session hi-jacking</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128" rel="nofollow">CVE-2008-0128</a>
-</p>
+    <p><strong>Moderate: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128" rel="nofollow">CVE-2008-0128</a></p>
 
-    
-<p>When using the SingleSignOn Valve via https the Cookie JSESSIONIDSSO is
+    <p>When using the SingleSignOn Valve via https the Cookie JSESSIONIDSSO is
        transmitted without the "secure" attribute, resulting in it being
        transmitted to any content that is - by purpose or error - requested via
        http from the same server. </p>
 
-    
-<p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=684900">revision 684900</a>.</p>
+    <p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=684900">revision 684900</a>.</p>
 
-    
-<p>Affects: 4.1.0-4.1.37</p>
+    <p>Affects: 4.1.0-4.1.37</p>
 
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" rel="nofollow">CVE-2008-1232</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" rel="nofollow">CVE-2008-1232</a></p>
 
-    
-<p>The message argument of HttpServletResponse.sendError() call is not only
+    <p>The message argument of HttpServletResponse.sendError() call is not only
        displayed on the error page, but is also used for the reason-phrase of
        HTTP response. This may include characters that are illegal in HTTP
        headers. It is possible for a specially crafted message to result in
@@ -457,74 +131,49 @@
        XSS attack, unfiltered user supplied data must be included in the message
        argument.</p>
 
-    
-<p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=680947">revision 680947</a>.</p>
+    <p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=680947">revision 680947</a>.</p>
 
-    
-<p>Affects: 4.1.0-4.1.37</p>
+    <p>Affects: 4.1.0-4.1.37</p>
 
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" rel="nofollow">CVE-2008-2370</a>
-</p>
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" rel="nofollow">CVE-2008-2370</a></p>
 
-    
-<p>When using a RequestDispatcher the target path was normalised before the 
+    <p>When using a RequestDispatcher the target path was normalised before the 
        query string was removed. A request that included a specially crafted 
        request parameter could be used to access content that would otherwise be 
        protected by a security constraint or by locating it in under the WEB-INF 
        directory.</p>
 
-       
-<p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=680950">revision 680950</a>.</p>
+       <p>This was fixed in <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=680950">revision 680950</a>.</p>
 
+    <p>Affects: 4.1.0-4.1.37</p>
     
-<p>Affects: 4.1.0-4.1.37</p>
-    
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.37">Fixed in Apache Tomcat 4.1.37</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3164" rel="nofollow">CVE-2005-3164</a>
-</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.37">Fixed in Apache Tomcat 4.1.37</h3><div class="text">
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3164" rel="nofollow">CVE-2005-3164</a></p>
 
-    
-<p>If a client specifies a Content-Length but disconnects before sending
+    <p>If a client specifies a Content-Length but disconnects before sending
        any of the request body, the deprecated AJP connector processes the
        request using the request body of the previous request. Users are advised
        to use the default, supported Coyote AJP connector which does not exhibit
        this issue.</p>
 
-    
-<p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
+    <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Moderate: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355" rel="nofollow">CVE-2007-1355</a>
-</p>
+    <p><strong>Moderate: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355" rel="nofollow">CVE-2007-1355</a></p>
 
-    
-<p>The JSP and Servlet included in the sample application within the Tomcat
+    <p>The JSP and Servlet included in the sample application within the Tomcat
        documentation webapp did not escape user provided data before including
        it in the output. This enabled a XSS attack. These pages have been
        simplified not to use any user provided data in the output.</p>
 
-    
-<p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
+    <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449" rel="nofollow">CVE-2007-2449</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449" rel="nofollow">CVE-2007-2449</a></p>
 
-    
-<p>JSPs within the examples web application did not escape user provided
+    <p>JSPs within the examples web application did not escape user provided
        data before including it in the output. This enabled a XSS attack. These
        JSPs now filter the data before use. This issue may be mitigated by
        undeploying the examples web application. Note that it is recommended
@@ -532,47 +181,32 @@
        system.
        </p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450" rel="nofollow">CVE-2007-2450</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450" rel="nofollow">CVE-2007-2450</a></p>
 
-    
-<p>The Manager web application did not escape user provided data before
+    <p>The Manager web application did not escape user provided data before
        including it in the output. This enabled a XSS attack. This application
        now filters the data before use. This issue may be mitigated by logging
        out (closing the browser) of the application once the management tasks
        have been completed.</p>
 
-    
-<p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
+    <p>Affects: 4.0.1-4.0.6, 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Low: Session hi-jacking</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382" rel="nofollow">CVE-2007-3382</a>
-</p>
+    <p><strong>Low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382" rel="nofollow">CVE-2007-3382</a></p>
 
-    
-<p>Tomcat incorrectly treated a single quote character (') in a cookie
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
        value as a delimiter. In some circumstances this lead to the leaking of
        information such as session ID to an attacker.</p>
 
-    
-<p>Affects: 4.1.0-4.1.36</p>
+    <p>Affects: 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3383" rel="nofollow">CVE-2007-3383</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3383" rel="nofollow">CVE-2007-3383</a></p>
 
-    
-<p>When reporting error messages, the SendMailServlet (part of the examples
+    <p>When reporting error messages, the SendMailServlet (part of the examples
        web application) did not escape user provided data before including it in
        the output. This enabled a XSS attack. This Servlet now filters the data
        before use. This issue may be mitigated by undeploying the examples web
@@ -580,64 +214,41 @@
        application is not installed on a production system.
        </p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Low: Session hi-jacking</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385" rel="nofollow">CVE-2007-3385</a>
-</p>
+    <p><strong>Low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385" rel="nofollow">CVE-2007-3385</a></p>
 
-    
-<p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
        In some circumstances this lead to the leaking of information such as
        session ID to an attacker.</p>
 
-    
-<p>Affects: 4.1.0-4.1.36</p>
+    <p>Affects: 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Low: Session hi-jacking</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333" rel="nofollow">CVE-2007-5333</a>
-</p>
+    <p><strong>Low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333" rel="nofollow">CVE-2007-5333</a></p>
 
-    
-<p>The previous fix for
+    <p>The previous fix for
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385" rel="nofollow">CVE-2007-3385</a> was incomplete. It did not consider the
        use of quotes or %5C within a cookie value.</p>
 
-    
-<p>Affects: 4.1.0-4.1.36</p>
+    <p>Affects: 4.1.0-4.1.36</p>
 
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461" rel="nofollow">CVE-2007-5461</a>
-</p>
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461" rel="nofollow">CVE-2007-5461</a></p>
 
-    
-<p>When Tomcat's WebDAV servlet is configured for use with a context and
+    <p>When Tomcat's WebDAV servlet is configured for use with a context and
        has been enabled for write, some WebDAV requests that specify an entity
        with a SYSTEM tag can result in the contents of arbitary files being
        returned to the client.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.36</p>
 
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.36">Fixed in Apache Tomcat 4.1.36</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090" rel="nofollow">CVE-2005-2090</a>
-</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.36">Fixed in Apache Tomcat 4.1.36</h3><div class="text">
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090" rel="nofollow">CVE-2005-2090</a></p>
 
-    
-<p>Requests with multiple content-length headers should be rejected as
+    <p>Requests with multiple content-length headers should be rejected as
        invalid. When multiple components (firewalls, caches, proxies and Tomcat)
        process a sequence of requests where one or more requests contain
        multiple content-length headers and several components do not
@@ -648,22 +259,16 @@
        content-length headers.
        </p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>
 
-    
-<p>
-<strong>Important: Directory traversal</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450" rel="nofollow">CVE-2007-0450</a>
-</p>
+    <p><strong>Important: Directory traversal</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450" rel="nofollow">CVE-2007-0450</a></p>
 
-    
-<p>The fix for this issue was insufficient. A fix was also required in the
+    <p>The fix for this issue was insufficient. A fix was also required in the
        JK connector module for httpd. See 
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860" rel="nofollow">CVE-2007-1860</a> for further information.</p>
 
-    
-<p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is
+    <p>Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is
        used behind a proxy (including, but not limited to, Apache HTTP server
        with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP
        request containing strings like "/\../" may allow attackers to work
@@ -671,46 +276,31 @@
        contexts.
     </p>
 
-    
-<p>The following Java system properties have been added to Tomcat to provide 
+    <p>The following Java system properties have been added to Tomcat to provide 
        additional control of the handling of path delimiters in URLs (both
        options default to false):</p>
-       
-<ul>
-         
-<li>
-           
-<code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>:
+       <ul>
+         <li>
+           <code>org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH</code>:
            <code>true|false</code>
-         
-</li>
-         
-<li>
-           
-<code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>:
+         </li>
+         <li>
+           <code>org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH</code>:
            <code>true|false</code>
-         
-</li>
-       
-</ul>
+         </li>
+       </ul>
 
-    
-<p>Due to the impossibility to guarantee that all URLs are handled by Tomcat
+    <p>Due to the impossibility to guarantee that all URLs are handled by Tomcat
        as they are in proxy servers, Tomcat should always be secured as if no
        proxy restricting context access was used.
     </p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>
 
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358" rel="nofollow">CVE-2007-1358</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358" rel="nofollow">CVE-2007-1358</a></p>
 
-    
-<p>Web pages that display the Accept-Language header value sent by the
+    <p>Web pages that display the Accept-Language header value sent by the
        client are susceptible to a cross-site scripting attack if they assume
        the Accept-Language header value conforms to RFC 2616. Under normal
        circumstances this would not be possible to exploit, however older
@@ -722,120 +312,77 @@
        not assume that the headers conform to RFC 2616 and should filter the
        values appropriately.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.35">Fixed in Apache Tomcat 4.1.35</h3>
-<div class="text">
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.34</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.35">Fixed in Apache Tomcat 4.1.35</h3><div class="text">
 
-    
-<p>
-<strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4308" rel="nofollow">CVE-2008-4308</a>
-</p>
+    <p><strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4308" rel="nofollow">CVE-2008-4308</a></p>
 
-    
-<p>
-<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
+    <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
     40771</a> may result in the disclosure of POSTed content from a previous
     request. For a vulnerability to exist, the content read from the input
     stream must be disclosed, eg via writing it to the response and committing
     the response, before the ArrayIndexOutOfBoundsException occurs which will
     halt processing of the request.</p>
 
-    
-<p>Affects: 4.1.32-4.1.34 (4.0.x unknown)</p>
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.32">Fixed in Apache Tomcat 4.1.32</h3>
-<div class="text">
+    <p>Affects: 4.1.32-4.1.34 (4.0.x unknown)</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.32">Fixed in Apache Tomcat 4.1.32</h3><div class="text">
 
-    
-<p>
-<strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271" rel="nofollow">CVE-2008-3271</a>
-</p>
+    <p><strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271" rel="nofollow">CVE-2008-3271</a></p>
 
-    
-<p>
-<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835">
+    <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835">
     Bug 25835</a> can, in rare circumstances - this has only been reproduced
     using a debugger to force a particular processing sequence for two threads -
     allow a user from a non-permitted IP address to gain access to a context
     that is protected with a valve that extends RequestFilterValve. This includes
     the standard RemoteAddrValve and RemoteHostValve implementations.</p>
 
-    
-<p>Affects: 4.1.0-4.1.31</p>
+    <p>Affects: 4.1.0-4.1.31</p>
 
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858" rel="nofollow">CVE-2007-1858</a>
-</p>
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858" rel="nofollow">CVE-2007-1858</a></p>
 
-    
-<p>The default SSL configuration permitted the use of insecure cipher suites
+    <p>The default SSL configuration permitted the use of insecure cipher suites
        including the anonymous cipher suite. The default configuration no
        longer permits the use of insecure cipher suites.</p>
 
-    
-<p>Affects: 4.1.28-4.1.31</p>
+    <p>Affects: 4.1.28-4.1.31</p>
 
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7196" rel="nofollow">CVE-2006-7196</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7196" rel="nofollow">CVE-2006-7196</a></p>
 
-    
-<p>The calendar application included as part of the JSP examples is
+    <p>The calendar application included as part of the JSP examples is
        susceptible to a cross-site scripting attack as it does not escape
        user provided data before including it in the returned page.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
 
-    
-<p>
-<strong>Low: Directory listing</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835" rel="nofollow">CVE-2006-3835</a>
-</p>
+    <p><strong>Low: Directory listing</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835" rel="nofollow">CVE-2006-3835</a></p>
 
-    
-<p>This is expected behaviour when directory listings are enabled. The
+    <p>This is expected behaviour when directory listings are enabled. The
        semicolon (;) is the separator for path parameters so inserting one
        before a file name changes the request into a request for a directory
        with a path parameter. If directory listings are enabled, a diretcory
        listing will be shown. In response to this and other directory listing
        issues, directory listings were changed to be disabled by default.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
 
-    
-<p>
-<strong>Low: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838" rel="nofollow">CVE-2005-4838</a>
-</p>
+    <p><strong>Low: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838" rel="nofollow">CVE-2005-4838</a></p>
 
-    
-<p>Various JSPs included as part of the JSP examples and the Tomcat Manager
+    <p>Various JSPs included as part of the JSP examples and the Tomcat Manager
        are susceptible to a cross-site scripting attack as they do not escape
        user provided data before including it in the returned page.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
 
-    
-<p>
-<strong>Important: Denial of service</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510" rel="nofollow">CVE-2005-3510</a>
-</p>
+    <p><strong>Important: Denial of service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510" rel="nofollow">CVE-2005-3510</a></p>
 
-    
-<p>The root cause is the relatively expensive calls required to generate
+    <p>The root cause is the relatively expensive calls required to generate
        the content for the directory listings. If directory listings are
        enabled, the number of files in each directory should be kepp to a
        minimum. In response to this issue, directory listings were changed to
@@ -844,270 +391,164 @@
        patch</a> has been proposed that would improve performance, particularly
        for large directories, by caching directory listings.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.29">Fixed in Apache Tomcat 4.1.29</h3>
-<div class="text">
-    
-<p>
-<strong>Moderate: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1567" rel="nofollow">CVE-2002-1567</a>
-</p>
+    <p>Affects: 4.0.0-4.0.6, 4.1.0-4.1.31</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.29">Fixed in Apache Tomcat 4.1.29</h3><div class="text">
+    <p><strong>Moderate: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1567" rel="nofollow">CVE-2002-1567</a></p>
 
-    
-<p>The unmodified requested URL is included in the 404 response header. The
+    <p>The unmodified requested URL is included in the 404 response header. The
        new lines in this URL appear to the client to be the end of the header
        section. The remaining part of the URL, including the script elements, is
        treated as part of the response body and the client executes the script.
        Tomcat now replaces potentially unsafe characters in the response
        headers with spaces.</p>
 
-    
-<p>Affects: 4.1.0-4.1.28</p>
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.13,_4.0.6">Fixed in Apache Tomcat 4.1.13, 4.0.6</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1394" rel="nofollow">CVE-2002-1394</a>
-</p>
+    <p>Affects: 4.1.0-4.1.28</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.13,_4.0.6">Fixed in Apache Tomcat 4.1.13, 4.0.6</h3><div class="text">
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1394" rel="nofollow">CVE-2002-1394</a></p>
 
-    
-<p>A specially crafted URL using the invoker servlet in conjunction with the
+    <p>A specially crafted URL using the invoker servlet in conjunction with the
        default servlet can enable an attacker to obtain the source of JSP pages
        or, under special circumstances, a static resource that would otherwise
        have been protected by a security constraint without the need to be
        properly authenticated. This is a variation of
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1148" rel="nofollow">CVE-2002-1148</a>
-</p>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1148" rel="nofollow">CVE-2002-1148</a></p>
 
-    
-<p>Affects: 4.0.0-4.0.5, 4.1.0-4.1.12</p>
+    <p>Affects: 4.0.0-4.0.5, 4.1.0-4.1.12</p>
 
-    
-<p>
-<strong>Moderate: Cross-site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0682" rel="nofollow">CVE-2002-0682</a>
-</p>
+    <p><strong>Moderate: Cross-site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0682" rel="nofollow">CVE-2002-0682</a></p>
 
-    
-<p>A specially crafted URL using the invoker servlet and various internal
+    <p>A specially crafted URL using the invoker servlet and various internal
        classess causes Tomcat to throw an exception that includes unescaped
        information from the malformed request. This allows the XSS attack.</p>
 
-    
-<p>Affects: 4.0.0-4.0.5, 4.1.0-4.1.12</p>
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.12,_4.0.5">Fixed in Apache Tomcat 4.1.12, 4.0.5</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1148" rel="nofollow">CVE-2002-1148</a>
-</p>
+    <p>Affects: 4.0.0-4.0.5, 4.1.0-4.1.12</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.12,_4.0.5">Fixed in Apache Tomcat 4.1.12, 4.0.5</h3><div class="text">
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1148" rel="nofollow">CVE-2002-1148</a></p>
 
-    
-<p>A specially crafted URL using the default servlet can enable an attacker
+    <p>A specially crafted URL using the default servlet can enable an attacker
        to obtain the source of JSP pages.</p>
 
-    
-<p>Affects: 4.0.0-4.0.4, 4.1.0-4.1.11</p>
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.3">Fixed in Apache Tomcat 4.1.3</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Denial of service</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0935" rel="nofollow">CVE-2002-0935</a>
-</p>
+    <p>Affects: 4.0.0-4.0.4, 4.1.0-4.1.11</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.3">Fixed in Apache Tomcat 4.1.3</h3><div class="text">
+    <p><strong>Important: Denial of service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0935" rel="nofollow">CVE-2002-0935</a></p>
 
-    
-<p>A malformed HTTP request can cause the request processing thread to
+    <p>A malformed HTTP request can cause the request processing thread to
        become unresponsive. A sequence of such requests will cause all request
        processing threads, and hence Tomcat as a whole, to become unresponsive.</p>
 
-    
-<p>Affects: 4.0.0-4.0.2?, 4.0.3, 4.0.4-4.0.6?, 4.1.0-4.1.2?</p>
+    <p>Affects: 4.0.0-4.0.2?, 4.0.3, 4.0.4-4.0.6?, 4.1.0-4.1.2?</p>
 
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.1.0">Fixed in Apache Tomcat 4.1.0</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Denial of service</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0866" rel="nofollow">CVE-2003-0866</a>
-</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.1.0">Fixed in Apache Tomcat 4.1.0</h3><div class="text">
+    <p><strong>Important: Denial of service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0866" rel="nofollow">CVE-2003-0866</a></p>
 
-    
-<p>A malformed HTTP request can cause the request processing thread to
+    <p>A malformed HTTP request can cause the request processing thread to
        become unresponsive. A sequence of such requests will cause all request
        processing threads, and hence Tomcat as a whole, to become unresponsive.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6</p>
+    <p>Affects: 4.0.0-4.0.6</p>
 
-    
-<p>
-<strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2006" rel="nofollow">CVE-2002-2006</a>
-</p>
+    <p><strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2006" rel="nofollow">CVE-2002-2006</a></p>
 
-    
-<p>The snoop and trouble shooting servlets installed as part of the examples
+    <p>The snoop and trouble shooting servlets installed as part of the examples
        include output that identifies the Tomcat installation path.</p>
 
-    
-<p>Affects: 4.0.0-4.0.6</p>
+    <p>Affects: 4.0.0-4.0.6</p>
 
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.0.2">Fixed in Apache Tomcat 4.0.2</h3>
-<div class="text">
-    
-<p>
-<strong>Low: Information disclosure</strong>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.0.2">Fixed in Apache Tomcat 4.0.2</h3><div class="text">
+    <p><strong>Low: Information disclosure</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2009" rel="nofollow">CVE-2002-2009</a>,
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0917" rel="nofollow">CVE-2001-0917</a>
-</p>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0917" rel="nofollow">CVE-2001-0917</a></p>
 
-    
-<p>Requests for JSP files where the file name is preceded by '+/', '&gt;/',
+    <p>Requests for JSP files where the file name is preceded by '+/', '&gt;/',
        '&lt;/' or '%20/' or a request for a JSP with a long file name would
        result in in an error page that included the full file system path to
        the JSP file.</p>
 
-    
-<p>Affects: 4.0.0-4.0.1</p>
-  
-</div>
-<h3 id="Fixed_in_Apache_Tomcat_4.0.0">Fixed in Apache Tomcat 4.0.0</h3>
-<div class="text">
-    
-<p>
-<strong>Moderate: Security manager bypass</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0493" rel="nofollow">CVE-2002-0493</a>
-</p>
+    <p>Affects: 4.0.0-4.0.1</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_4.0.0">Fixed in Apache Tomcat 4.0.0</h3><div class="text">
+    <p><strong>Moderate: Security manager bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0493" rel="nofollow">CVE-2002-0493</a></p>
 
-    
-<p>If errors are encountered during the parsing of web.xml and Tomcat is
+    <p>If errors are encountered during the parsing of web.xml and Tomcat is
        configured to use a security manager it is possible for Tomcat to start
        without the security manager in place.</p> 
 
-    
-<p>Affects: Pre-release builds of 4.0.0</p>
-  
-</div>
-<h3 id="Unverified">Unverified</h3>
-<div class="text">
-    
-<p>
-<strong>Low: Installation path disclosure</strong>
+    <p>Affects: Pre-release builds of 4.0.0</p>
+  </div><h3 id="Unverified">Unverified</h3><div class="text">
+    <p><strong>Low: Installation path disclosure</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4703" rel="nofollow">CVE-2005-4703</a>, 
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2008" rel="nofollow">CVE-2002-2008</a>
-</p>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2008" rel="nofollow">CVE-2002-2008</a></p>
 
-    
-<p>This issue only affects Windows operating systems. It can not be
+    <p>This issue only affects Windows operating systems. It can not be
        reproduced on Windows XP Home with JDKs 1.3.1, 1.4.2, 1.5.0 or 1.6.0.
        Further investigation is required to determine the Windows operating
        system and JDK combinations that do exhibit this issue. The
        vulnerability reports for this issue state that it is fixed in 4.1.3
        onwards.</p>
 
-    
-<p>Affects: 4.0.3?</p>
+    <p>Affects: 4.0.3?</p>
 
-    
-<p>
-<strong>Important: Denial of service</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1895" rel="nofollow">CVE-2002-1895</a>
-</p>
+    <p><strong>Important: Denial of service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1895" rel="nofollow">CVE-2002-1895</a></p>
 
-    
-<p>This issue only affects configurations that use IIS in conjunction with
+    <p>This issue only affects configurations that use IIS in conjunction with
        Tomcat and the AJP1.3 connector. It can not be reproduced using Windows
        2000 SP4 with latest patches and Tomcat 4.0.4 with JDK 1.3.1. The
        vulnerability reports for this issue state that it is fixed in 4.1.10
        onwards.</p>
 
-    
-<p>Affects: 4.0.4?</p>
-  
-</div>
-<h3 id="Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</h3>
-<div class="text">
-    
-<p>
-<strong>Important: Directory traversal</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" rel="nofollow">CVE-2008-2938</a>
-</p>
+    <p>Affects: 4.0.4?</p>
+  </div><h3 id="Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</h3><div class="text">
+    <p><strong>Important: Directory traversal</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" rel="nofollow">CVE-2008-2938</a></p>
 
-    
-<p>Originally reported as a Tomcat vulnerability the root cause of this
+    <p>Originally reported as a Tomcat vulnerability the root cause of this
        issue is that the JVM does not correctly decode UTF-8 encoded URLs to
        UTF-8. This exposes a directory traversal vulnerability when the
        connector uses <code>URIEncoding="UTF-8"</code>. This directory traversal
        is limited to the docBase of the web application.</p>
        
-    
-<p>If a context is configured with <code>allowLinking="true"</code> then the
+    <p>If a context is configured with <code>allowLinking="true"</code> then the
        directory traversal vulnerability is extended to the entire file system
        of the host server.</p>
        
-    
-<p>It should also be noted that setting
+    <p>It should also be noted that setting
        <code>useBodyEncodingForURI="true"</code> has the same effect as setting
        <code>URIEncoding="UTF-8"</code> when processing requests with bodies
        encoded with UTF-8.</p>
 
-    
-<p>Although the root cause was quickly identified as a JVM issue and that it
+    <p>Although the root cause was quickly identified as a JVM issue and that it
        affected multiple JVMs from multiple vendors, it was decided to report
        this as a Tomcat vulnerability until such time as the JVM vendors
        provided updates to resolve this issue. For further information on the
        status of this issue for your JVM, contact your JVM vendor.</p>
        
-    
-<p>A workaround was implemented in
+    <p>A workaround was implemented in
        <a href="https://svn.apache.org/viewvc?view=rev&amp;rev=681065">revision 681065</a>
        that protects against this and any similar character
        encoding issues that may still exist in the JVM. This work around is
        included in Tomcat 4.1.39 onwards.</p>
 
-    
-<p>
-<strong>Denial of service vulnerability</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0936" rel="nofollow">CVE-2002-0936</a>
-</p>
+    <p><strong>Denial of service vulnerability</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0936" rel="nofollow">CVE-2002-0936</a></p>
 
-    
-<p>The issue described requires an attacker to be able to plant a JSP page
+    <p>The issue described requires an attacker to be able to plant a JSP page
        on the Tomcat server. If an attacker can do this then the server is
        already compromised. In this case an attacker could just as easily add a
        page that called System.exit(1) rather than relying on a bug in an
        internal Sun class.</p>
 
-  
-</div>
-</div>
-</div>
-</div>
-</main>
-<footer id="footer">
+  </div></div></div></div></main><footer id="footer">
     Copyright &copy; 1999-2020, The Apache Software Foundation
     <br>
     Apache Tomcat, Tomcat, Apache, the Apache feather, and the Apache Tomcat
     project logo are either registered trademarks or trademarks of the Apache
     Software Foundation.
-  </footer>
-</div>
-<script src="res/js/tomcat.js"></script>
-</body>
-</html>
+  </footer></div><script src="res/js/tomcat.js"></script></body></html>
\ No newline at end of file



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org
For additional commands, e-mail: dev-help@tomcat.apache.org