This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/9.0.x by this push:
     new b5606f66d8 Provide guidance on allowing write access to the web 
application
b5606f66d8 is described below

commit b5606f66d828cf823a1c0e1f76df3a9112237463
Author: Mark Thomas <ma...@apache.org>
AuthorDate: Sat Jun 7 09:32:02 2025 +0100

    Provide guidance on allowing write access to the web application
---
 webapps/docs/changelog.xml       |  9 +++++++++
 webapps/docs/default-servlet.xml | 25 ++++++++++++++-----------
 webapps/docs/security-howto.xml  | 13 +++++++++++++
 3 files changed, 36 insertions(+), 11 deletions(-)

diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml
index 6a92bb8a3a..c5fea396f2 100644
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -105,6 +105,15 @@
   issues do not "pop up" wrt. others).
 -->
 <section name="Tomcat 9.0.107 (remm)" rtext="in development">
+  <subsection name="Web applications">
+    <changelog>
+      <add>
+        Documentation. Provide more explicit guidance regarding the security
+        considerations for enabling write access to the web application via
+        WebDAV, HTTP PUT requests or similar. (markt)
+      </add>
+    </changelog>
+  </subsection>
 </section>
 <section name="Tomcat 9.0.106 (remm)" rtext="release in progress">
   <subsection name="Catalina">
diff --git a/webapps/docs/default-servlet.xml b/webapps/docs/default-servlet.xml
index 8e8139b65f..409fc7487d 100644
--- a/webapps/docs/default-servlet.xml
+++ b/webapps/docs/default-servlet.xml
@@ -150,17 +150,20 @@ Tomcat.</p>
         directory listing will be shown.
   </property>
   <property name="localXsltFile">
-        You may also customize your directory listing by directory by
-        configuring <code>localXsltFile</code>. This must be a file in the
-        directory where the listing will take place to with a
-        <code>.xsl</code> or <code>.xslt</code> extension. This overrides
-        <code>globalXsltFile</code> and <code>contextXsltFile</code>. If this
-        value is present but a file does not exist, then
-        <code>contextXsltFile</code> will be used. If
-        <code>contextXsltFile</code> does not exist, then
-        <code>globalXsltFile</code> will be used. If
-        <code>globalXsltFile</code> does not exist, then the default
-        directory listing will be shown.
+    <p>You may also customize your directory listing by directory by 
configuring
+    <code>localXsltFile</code>. This must be a file in the directory where the
+    listing will take place to with a <code>.xsl</code> or <code>.xslt</code>
+    extension. This overrides <code>globalXsltFile</code> and
+    <code>contextXsltFile</code>. If this value is present but a file does not
+    exist, then <code>contextXsltFile</code> will be used. If
+    <code>contextXsltFile</code> does not exist, then
+    <code>globalXsltFile</code> will be used. If <code>globalXsltFile</code>
+    does not exist, then the default directory listing will be shown.</p>
+    <p>Any <code>localXsltFile</code> is both a Tomcat configuration file and
+    part of the web application. As per the Tomcat security model, such files
+    are assumed to be trusted. Write access to this file should, like write
+    access to any Tomcat configuration file, be limited to trusted users. This
+    incudes users with remote access via WebDAV, PUT or similar.</p>
   </property>
   <property name="input">
         Input buffer size (in bytes) when reading
diff --git a/webapps/docs/security-howto.xml b/webapps/docs/security-howto.xml
index a3b8e4119e..7839cd6aa6 100644
--- a/webapps/docs/security-howto.xml
+++ b/webapps/docs/security-howto.xml
@@ -178,6 +178,19 @@
    </subsection>
   </section>
 
+  <section name="User web applications">
+    <p>Web applications are assumed to be trusted. It is not safe to deploy web
+    applications from untrusted sources.</p>
+
+    <p>Any application functionality that permits the modification of a web
+    application (WebDAV, HTTP PUT requests etc.) may impact the security of
+    either the web application or the Tomcat instance on which it is running.
+    Such functionality should either be restricted to trusted users or
+    limited in scope (e.g. via security constraints) such that users with 
access
+    to the functionality are unable to imapct the security of either the web
+    application or the Tomcat instance on which it is running.</p>
+  </section>
+
   <section name="Security manager">
     <p>Enabling the security manager causes web applications to be run in a
     sandbox, significantly limiting a web application's ability to perform


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to