Re: percent 0008 exploit

2005-02-16 Thread Michiel Toneman
I've just been trying to confrm the vulnerability without any luck. Any place in the wild where we could find such a problem? I've tried replacing: http://www.server.dom/jsp/test.jsp with: http://www.server.dom/jsp/test.jsp%0008 in a number of setups without any results. Cheers, Michiel Norris

RE: percent 0008 exploit

2005-02-16 Thread Mike Curwen
Is it this old chestnut? Mike Curwen Product Manager Globally Boundless www.globallyboundless.com 204.885.7733 ext 227 Privacy Compliance: This e-mail message is

RE: percent 0008 exploit

2005-02-16 Thread Mike Curwen
hmm.. that would be _this_ old chestnut... (a little eager on the send, sorry.) http://shh.thathost.com/secadv/2001-03-29-tomcat.txt This particular exploit was fixed a long time ago (wasn't it?) Mike Curwen -Original Message- From: Norris Shelton [mailto:[EMAIL PROTECTED] Sent:

Re: percent 0008 exploit

2005-02-16 Thread Mark Thomas
I can't reproduce it either. I am using the latest 4.1.x from CVS but I am 100% certain there have been no changes that would relate to this since 4.1.30. On a related topic, security bugs should be reported privately by email to [EMAIL PROTECTED] If this had been a real issue it would have

Re: percent 0008 exploit

2005-02-16 Thread Norris Shelton
It is definately reproducable on his sytem, but he is on a secured connection. It does not happen on mine. The only variable that we know of is the JRE. --- Mark Thomas [EMAIL PROTECTED] wrote: I can't reproduce it either. I am using the latest 4.1.x from CVS but I am 100% certain there