Configuring CORS filter

2018-06-20 Thread Bradley, Richard
Hello, Tomcat version: 8.5.31 O/S: Windows Server 2008 R2 McAfee vulnerability checker has reported a MEDIUM level vulnerability as follows: Vulnerability: CVE-2018-8014: Apache Tomcat Vulnerability Prior To 8.5.32 [FID 23621] Apache Software Foundation reports this in

Re: [EXTERNAL] Re: Configuring CORS filter

2018-06-20 Thread Bradley, Richard
Thank you Mark! For the quick reply! Yeah...Apache reports it as LOW and they report as MEDIUM. We have to mitigate all MEDIUM and HIGH vulnerabilities. Best regards, Rick On Wed, Jun 20, 2018 at 1:00 PM, Mark Thomas wrote: > On 20/06/18 18:16, Bradley, Richard wrote: > > Hello, > > > >

oracle 12c driver (UNCLASSIFIED)

2018-06-20 Thread Lueders, Paul T CIV USARMY NGIC (US)
CLASSIFICATION: UNCLASSIFIED We have configured an oracle 12c connection using the Oracle jdbc connector . What we are experiencing is that the application is locking up and the database requires a restart. We believe that the issue is that application is not releasing the connections and

[ANN] Apache Tomcat Native 1.2.17 released

2018-06-20 Thread Jean-Frederic Clere
The Apache Tomcat team announces the immediate availability of Apache Tomcat Native 1.2.17 stable. The key features of this release are: - Windows binaries built with APR 1.6.3 and OpenSSL 1.0.2o. - Fix Certificate verification using CRL. - Arrange OCSP response processing. Note that users

Re: oracle 12c driver (UNCLASSIFIED)

2018-06-20 Thread Maxim Solodovnik
We are currently using ojdbc6 in production I would use ojdbc8 for new project ( http://www.oracle.com/technetwork/database/features/jdbc/jdbc-ucp-122-3110062.html ) I believe the problem is caused by connection pool settings, not the driver On Thu, Jun 21, 2018 at 2:38 AM Lueders, Paul T

Re: Configuring CORS filter

2018-06-20 Thread Mark Thomas
On 20/06/18 18:16, Bradley, Richard wrote: > Hello, > > Tomcat version: 8.5.31 > O/S: Windows Server 2008 R2 > > McAfee vulnerability checker has reported a MEDIUM level vulnerability as > follows: > > Vulnerability: CVE-2018-8014: Apache Tomcat Vulnerability Prior To 8.5.32 > [FID 23621] > >

mod_jk: Forwarding URLs containing escaped slashes (e.g. for REST services) fail with syntactical-wrong double-escaping

2018-06-20 Thread Jäkel , Guido
Hi all, I have problems to pass (REST-) URLs containing escaped slashes ('%2F') in path elements using the Apache httpd and mod_jk to the application server (in fact not Tomcat, but Wildfy. But this is of no matter, here). This kind of URL may be accepted by the httpd using the option

RE: mod_jk: Forwarding URLs containing escaped slashes (e.g. for REST services) fail with syntactical-wrong double-escaping

2018-06-20 Thread Jäkel , Guido
Dear Markus, I'm not using Tomcat as backend here. And in addition, this will not help in case of syntactically wrong URL patterns like '%252F' produced by mod_jk. thank you, anyway -- maybe emphasizing this option is useful for others here using Tomcat. Guido >-Original Message-

Re: mod_jk: Forwarding URLs containing escaped slashes (e.g. for REST services) fail with syntactical-wrong double-escaping

2018-06-20 Thread i...@flyingfischer.ch
> Hi all, > > I have problems to pass (REST-) URLs containing escaped slashes ('%2F') in > path elements using the Apache httpd and mod_jk to the application server > (in fact not Tomcat, but Wildfy. But this is of no matter, here). > > This kind of URL may be accepted by the httpd using