svn commit: r1885488 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

svn commit: r1885488 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml

Mark Thomas-2
Author: markt
Date: Thu Jan 14 14:19:10 2021
New Revision: 1885488

URL: http://svn.apache.org/viewvc?rev=1885488&view=rev
Log:
Update site for CVE-2021-24122

Modified:
    tomcat/site/trunk/docs/security-10.html
    tomcat/site/trunk/docs/security-7.html
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-10.xml
    tomcat/site/trunk/xdocs/security-7.xml
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-10.html
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Thu Jan 14 14:19:10 2021
@@ -41,6 +41,25 @@
 
   </div><h3 id="Fixed_in_Apache_Tomcat_10.0.0-M10"><span class="pull-right">17 November 2020</span> Fixed in Apache Tomcat 10.0.0-M10</h3><div class="text">
 
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122" rel="nofollow">CVE-2021-24122</a></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <a href="https://github.com/apache/tomcat/commit/7f004ac4531c45f9a2a2d1470561fe135cf27bc2">7f004ac4</a>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.0.0-M9</p>
+
     <p><strong>Moderate: HTTP/2 request header mix-up</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527" rel="nofollow">CVE-2020-17527</a></p>
 

Modified: tomcat/site/trunk/docs/security-7.html
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Thu Jan 14 14:19:10 2021
@@ -2,7 +2,7 @@
 <html lang="en"><head><META http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat 7 vulnerabilities</title><meta name="author" content="Apache Tomcat Project"></head><body><div id="wrapper"><header id="header"><div class="clearfix"><div class="menu-toggler pull-left" tabindex="1"><div class="hamburger"></div></div><a href="http://tomcat.apache.org/"><img class="tomcat-logo pull-left noPrint" alt="Tomcat Home" src="res/images/tomcat.png"></a><h1 class="pull-left">Apache Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a href="https://www.apache.org/foundation/contributing.html" target="_blank" class="pull-left"><img src="https://www.apache.org/images/SupportApache-small.png" class="support-asf" alt="Support Apache"></a><a h
 ref="http://www.apache.org/" target="_blank" class="pull-left"><img src="res/images/asf_logo.svg" class="asf-logo" alt="The Apache Software Foundation"></a></div></div></header><main id="middle"><div><div id="mainLeft"><div id="nav-wrapper"><form action="https://www.google.com/search" method="get"><div class="searchbox"><input value="tomcat.apache.org" name="sitesearch" type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" required="required" name="q" id="query" type="search"><button>GO</button></div></form><div class="asfevents"><a href="https://www.apache.org/events/current-event.html"><img src="https://www.apache.org/events/current-event-234x60.png" alt="Next ASF event"><br>
               Save the date!
             </a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a href="./index.html">Home</a></li><li><a href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a href="./whichversion.html">Which version?</a></li><li><a href="https://tomcat.apache.org/download-10.cgi">Tomcat 10 (beta)</a></li><li><a href="https://tomcat.apache.org/download-90.cgi">Tomcat 9</a></li><li><a href="https://tomcat.apache.org/download-80.cgi">Tomcat 8</a></li><li><a href="https://tomcat.apache.org/download-70.cgi">Tomcat 7</a></li><li><a href="https://tomcat.apache.org/download-connectors.cgi">Tomcat Connectors</a></li><li><a href="https://tomcat.apache.org/download-native.cgi">Tomcat Native</a></li><li><a href="https://tomcat.apache.org/download-taglibs.cgi">Taglibs</a></li><li><a href="https://archive.apache.org/dist/tomcat/">Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a href="./tomcat-10.0-doc/index.html">
 Tomcat 10.0 (beta)</a></li><li><a href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a href="./tomcat-8.5-doc/index.html">Tomcat 8.5</a></li><li><a href="./tomcat-7.0-doc/index.html">Tomcat 7.0</a></li><li><a href="./connectors-doc/">Tomcat Connectors</a></li><li><a href="./native-doc/">Tomcat Native</a></li><li><a href="https://cwiki.apache.org/confluence/display/TOMCAT">Wiki</a></li><li><a href="./migration.html">Migration Guide</a></li><li><a href="./presentations.html">Presentations</a></li><li><a href="https://cwiki.apache.org/confluence/x/Bi8lBg">Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a href="./security.html">Security Reports</a></li><li><a href="./findhelp.html">Find help</a></li><li><a href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ">FAQ</a></li><li><a href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug Database</a></li><li><a href="./irc.html">IRC</a></li></ul></div><div><h2>Get Involved</h2><ul><li><a
  href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a href="https://cwiki.apache.org/confluence/x/vIPzBQ">Translations</a></li><li><a href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a href="https://twitter.com/theapachetomcat">Twitter</a></li><li><a href="https://www.youtube.com/c/ApacheTomcatOfficial">YouTube</a></li><li><a href="https://blogs.apache.org/tomcat/">Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a href="./whoweare.html">Who We Are</a></li><li><a href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat">Swag</a></li><li><a href="./heritage.html">Heritage</a></li><li><a href="http://www.apache.org">Apache Home</a></li><li><a href="./resources.html">Resources</a></li><li><a href="./contact.html">Contact</a></li><li><a href="./legal.html">Legal</a></li><li><a href="https://www.apache.org/foundation/contributing.html">Support Apache</a></li><
 li><a href="https://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li><li><a href="http://www.apache.org/foundation/thanks.html">Thanks</a></li><li><a href="http://www.apache.org/licenses/">License</a></li></ul></div></nav></div></div><div id="mainRight"><div id="content"><h2 style="display: none;">Content</h2><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.105">Fixed in Apache Tomcat 7.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.104">Fixed in Apache Tomcat 7.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.100">Fixed in Apache Tomcat 7.0.100</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.99">Fixed in Apache Tomcat 7.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.94">Fixed in Apache Tomcat 7.0.94</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.91">Fixed in Apache Tomcat 7.0.91</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.90">Fixed in Apache Tomcat 7.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.89">Fixed in Apache Tomcat 7.0.89</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.88">Fixed in Apache Tomcat 7.0.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.85">Fixed in Apache Tomcat 7.0.85</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.84">Fixed in Apache Tomca
 t 7.0.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.82">Fixed in Apache Tomcat 7.0.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.81">Fixed in Apache Tomcat 7.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.79">Fixed in Apache Tomcat 7.0.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.78">Fixed in Apache Tomcat 7.0.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.77">Fixed in Apache Tomcat 7.0.77</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.76">Fixed in Apache Tomcat 7.0.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.75">Fixed in Apache Tomcat 7.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.73">Fixed in Apache Tomcat 7.0.73</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.72">Fixed in Apache Tomcat 7.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.70">Fixed in Apache Tomcat 7.0.70</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.68">Fixed in Apache Tomcat 7.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.67">Fixed in Apache Tomcat
  7.0.67</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.65">Fixed in Apache Tomcat 7.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.59">Fixed in Apache Tomcat 7.0.59</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.55">Fixed in Apache Tomcat 7.0.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.54">Fixed in Apache Tomcat 7.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.53">Fixed in Apache Tomcat 7.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.52">Fixed in Apache Tomcat 7.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.50">Fixed in Apache Tomcat 7.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.47">Fixed in Apache Tomcat 7.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.40">Fixed in Apache Tomcat 7.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.33">Fixed in Apache Tomcat 7.0.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.32">Fixed in Apache Tomcat 7.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.30">Fixed in Apache Tomcat
 7.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.28">Fixed in Apache Tomcat 7.0.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.23">Fixed in Apache Tomcat 7.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.22">Fixed in Apache Tomcat 7.0.22</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.21">Fixed in Apache Tomcat 7.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.20">Fixed in Apache Tomcat 7.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.19">Fixed in Apache Tomcat 7.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.14">Fixed in Apache Tomcat 7.0.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.12">Fixed in Apache Tomcat 7.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.11">Fixed in Apache Tomcat 7.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.8">Fixed in Apache Tomcat 7.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.6">Fixed in Apache Tomcat 7.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.5">Fixed in Apache Tomcat 7.0.5<
 /a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.4">Fixed in Apache Tomcat 7.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.2">Fixed in Apache Tomcat 7.0.2</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.107">Fixed in Apache Tomcat 7.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.105">Fixed in Apache Tomcat 7.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.104">Fixed in Apache Tomcat 7.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.100">Fixed in Apache Tomcat 7.0.100</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.99">Fixed in Apache Tomcat 7.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.94">Fixed in Apache Tomcat 7.0.94</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.91">Fixed in Apache Tomcat 7.0.91</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.90">Fixed in Apache Tomcat 7.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.89">Fixed in Apache Tomcat 7.0.89</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.88">Fixed in Apache Tomcat 7.0.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.85">Fixed in Apache Tom
 cat 7.0.85</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.84">Fixed in Apache Tomcat 7.0.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.82">Fixed in Apache Tomcat 7.0.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.81">Fixed in Apache Tomcat 7.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.79">Fixed in Apache Tomcat 7.0.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.78">Fixed in Apache Tomcat 7.0.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.77">Fixed in Apache Tomcat 7.0.77</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.76">Fixed in Apache Tomcat 7.0.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.75">Fixed in Apache Tomcat 7.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.73">Fixed in Apache Tomcat 7.0.73</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.72">Fixed in Apache Tomcat 7.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.70">Fixed in Apache Tomcat 7.0.70</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.68">Fixed in Apache Tomc
 at 7.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.67">Fixed in Apache Tomcat 7.0.67</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.65">Fixed in Apache Tomcat 7.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.59">Fixed in Apache Tomcat 7.0.59</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.55">Fixed in Apache Tomcat 7.0.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.54">Fixed in Apache Tomcat 7.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.53">Fixed in Apache Tomcat 7.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.52">Fixed in Apache Tomcat 7.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.50">Fixed in Apache Tomcat 7.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.47">Fixed in Apache Tomcat 7.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.40">Fixed in Apache Tomcat 7.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.33">Fixed in Apache Tomcat 7.0.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.32">Fixed in Apache Tomca
 t 7.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.30">Fixed in Apache Tomcat 7.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.28">Fixed in Apache Tomcat 7.0.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.23">Fixed in Apache Tomcat 7.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.22">Fixed in Apache Tomcat 7.0.22</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.21">Fixed in Apache Tomcat 7.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.20">Fixed in Apache Tomcat 7.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.19">Fixed in Apache Tomcat 7.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.14">Fixed in Apache Tomcat 7.0.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.12">Fixed in Apache Tomcat 7.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.11">Fixed in Apache Tomcat 7.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.8">Fixed in Apache Tomcat 7.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.6">Fixed in Apache Tomcat 7.
 0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.5">Fixed in Apache Tomcat 7.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.4">Fixed in Apache Tomcat 7.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.2">Fixed in Apache Tomcat 7.0.2</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul>
 </div><h3 id="Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x vulnerabilities</h3><div class="text">
     <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat 7.x. Each vulnerability is given a
@@ -39,6 +39,27 @@
        <a href="security.html">Tomcat Security Team</a>. Thank you.
     </p>
 
+  </div><h3 id="Fixed_in_Apache_Tomcat_7.0.107"><span class="pull-right">11 November 2020</span> Fixed in Apache Tomcat 7.0.107</h3><div class="text">
+
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122" rel="nofollow">CVE-2021-24122</a></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <a href="https://github.com/apache/tomcat/commit/800b03140e640f8892f27021e681645e8e320177">800b0314</a>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 7.0.0 to 7.0.106</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_7.0.105"><span class="pull-right">7 July 2020</span> Fixed in Apache Tomcat 7.0.105</h3><div class="text">
 
     <p><strong>Important: WebSocket DoS</strong>

Modified: tomcat/site/trunk/docs/security-8.html
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Thu Jan 14 14:19:10 2021
@@ -46,6 +46,25 @@
 
   </div><h3 id="Fixed_in_Apache_Tomcat_8.5.60"><span class="pull-right">17 November 2020</span> Fixed in Apache Tomcat 8.5.60</h3><div class="text">
 
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122" rel="nofollow">CVE-2021-24122</a></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <a href="https://github.com/apache/tomcat/commit/920dddbdb981f92e8d5872a4bb126a10af5ca8a9">920dddbd</a>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 8.5.0 to 8.5.59</p>
+
     <p><strong>Moderate: HTTP/2 request header mix-up</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527" rel="nofollow">CVE-2020-17527</a></p>
 

Modified: tomcat/site/trunk/docs/security-9.html
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Thu Jan 14 14:19:10 2021
@@ -41,6 +41,25 @@
 
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.40"><span class="pull-right">17 November 2020</span> Fixed in Apache Tomcat 9.0.40</h3><div class="text">
 
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122" rel="nofollow">CVE-2021-24122</a></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <a href="https://github.com/apache/tomcat/commit/935fc5582dc25ae10bab6f9d5629ff8d996cb533">935fc558</a>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.39</p>
+
     <p><strong>Moderate: HTTP/2 request header mix-up</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527" rel="nofollow">CVE-2020-17527</a></p>
 

Modified: tomcat/site/trunk/xdocs/security-10.xml
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Thu Jan 14 14:19:10 2021
@@ -52,6 +52,25 @@
 
   <section name="Fixed in Apache Tomcat 10.0.0-M10" rtext="17 November 2020">
 
+    <p><strong>Important: Information disclosure</strong>
+       <cve>CVE-2021-24122</cve></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <hashlink hash="7f004ac4531c45f9a2a2d1470561fe135cf27bc2"/>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.0.0-M9</p>
+
     <p><strong>Moderate: HTTP/2 request header mix-up</strong>
        <cve>CVE-2020-17527</cve></p>
 

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Thu Jan 14 14:19:10 2021
@@ -50,6 +50,29 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 7.0.107" rtext="11 November 2020">
+
+    <p><strong>Important: Information disclosure</strong>
+       <cve>CVE-2021-24122</cve></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <hashlink hash="800b03140e640f8892f27021e681645e8e320177"/>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 7.0.0 to 7.0.106</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 7.0.105" rtext="7 July 2020">
 
     <p><strong>Important: WebSocket DoS</strong>

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Thu Jan 14 14:19:10 2021
@@ -58,6 +58,25 @@
 
   <section name="Fixed in Apache Tomcat 8.5.60" rtext="17 November 2020">
 
+    <p><strong>Important: Information disclosure</strong>
+       <cve>CVE-2021-24122</cve></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <hashlink hash="920dddbdb981f92e8d5872a4bb126a10af5ca8a9"/>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 8.5.0 to 8.5.59</p>
+
     <p><strong>Moderate: HTTP/2 request header mix-up</strong>
        <cve>CVE-2020-17527</cve></p>
 

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1885488&r1=1885487&r2=1885488&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Thu Jan 14 14:19:10 2021
@@ -52,6 +52,25 @@
 
   <section name="Fixed in Apache Tomcat 9.0.40" rtext="17 November 2020">
 
+    <p><strong>Important: Information disclosure</strong>
+       <cve>CVE-2021-24122</cve></p>
+
+    <p>When serving resources from a network location using the NTFS file system
+       it was possible to bypass security constraints and/or view the source
+       code for JSPs in some configurations. The root cause was the unexpected
+       behaviour of the JRE API <code>File.getCanonicalPath()</code> which in
+       turn was caused by the inconsistent behaviour of the Windows API
+       (<code>FindFirstFileW</code>) in some circumstances.
+    </p>
+
+    <p>This was fixed with commit
+       <hashlink hash="935fc5582dc25ae10bab6f9d5629ff8d996cb533"/>.</p>
+
+    <p>This issue was reported the Apache Tomcat Security team by Ilja Brander
+       on 26 October 2020. The issue was made public on 14 January 2021.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.39</p>
+
     <p><strong>Moderate: HTTP/2 request header mix-up</strong>
        <cve>CVE-2020-17527</cve></p>
 



---------------------------------------------------------------------
To unsubscribe, e-mail: [hidden email]
For additional commands, e-mail: [hidden email]