You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tomcat.apache.org by bu...@apache.org on 2012/10/15 11:21:54 UTC
[Bug 51698] ajp CPing/Forward-Request packet forgery, is a design
decision? or a security vulnerability?
https://issues.apache.org/bugzilla/show_bug.cgi?id=51698
zhanqili <zh...@163.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|Connectors |Servlet & JSP API
Version|7.0.20 |6.0.8
Product|Tomcat 7 |Tomcat 6
Target Milestone|--- |default
OS|Windows XP |Windows Server 2008
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org
For additional commands, e-mail: dev-help@tomcat.apache.org
Re: [Bug 51698] ajp CPing/Forward-Request packet forgery, is a design
decision? or a security vulnerability?
Posted by Mark Thomas <ma...@apache.org>.
On 15/10/2012 10:21, bugzilla@apache.org wrote:
> https://issues.apache.org/bugzilla/show_bug.cgi?id=51698
>
> zhanqili <zh...@163.com> changed:
This idiot ^^^^^ has had their BZ account locked for messing about with
this bug. I have restored the original values.
Mark
>
> What |Removed |Added
> ----------------------------------------------------------------------------
> Component|Connectors |Servlet & JSP API
> Version|7.0.20 |6.0.8
> Product|Tomcat 7 |Tomcat 6
> Target Milestone|--- |default
> OS|Windows XP |Windows Server 2008
>
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org
For additional commands, e-mail: dev-help@tomcat.apache.org