>Hi Marc, 
>I saw this problem in 3.2.1 as well  - I made a fix for it in the tomcat 
that ships with the Borland AppServer >but 
>couldn't get anyone to comment on the fix in the main code-line 
(essentially I'm not a commiter so couldn't >submit the fix) 
Hi Thom,
Thanks for the info. Can someone from the Tomcat development team please 
comment on this? I would have thought that this was quite a serious 
security problem � am I wrong?
The way I see it, the bug could lead to anybody grabbing another user's 
role while appearing to be somebody else. This is certainly possible if 
you use somebody else's PC after they have. It may be even worse if you 
can also do this from a different PC � essentially getting a "random" 
role that somebody else already "provided" by logging in. Not to mention 
plain old failure in the case where a higher "privileged" person get's a 
lower privileged role allocated. It's not clear at this time whether the 
principal caching is tied to IP or "per pooled connection". If the 
latter, it's a bit more scary.
So once again, can someone from the Tomcat team PLEASE comment on this 
problem and whether a fix is being implemented? Perhaps there is too much 
work/redesign going on in 4.0 for people to consider patching 3.2.x but I 
would have thought this is pretty essential, and perhaps even merits a 
post to the BUGTRAQ mailing list. We already have 3 confirmed "sufferers" 
� who knows how many systems that depend on tomcat have slipped through 
the net and represent significant authentication breaches?

Cheers


Reply via email to