Hello Team, Some security issues were raised by our audit team and these issues were forwarded to secur...@apache.org. We got a response from Mark Thomas from the Security team Theses issues are listed below:
1. Banner Disclosure We observed that the GTApplication web server disclosed the Apache Coyote version in its HTTP response. The extracted version is: Apache-Coyote/1.1 Risk This information might help an attacker gain a greater understanding of the systems in use and potentially develop further attacks targeted at the specific version of Apache. Response Not a vulnerability in Apache Tomcat. Every currently supported version of Apache Tomcat includes that information in the header. All it tells an attacker is that you are running Apache Tomcat. If you really want to change it, a configuration option to do that is available on the connector. 2. The Character Set was not set. The Character set (Charset) was not explicitly set by the server. Risk There is a risk that characters in content are incorrectly interpreted by the server. Lack of charset can cause the browser to guess the encoding type and this could lead to Cross-site Scripting by encoding the payload in encoding types like UTF-7. Response Not a vulnerability in Apache Tomcat. RFC2616 requires clients to treat responses without a character encoding as being encoding with ISO-8859-1. Clients that try to guess the charset are in breach of RFC2616. Further that they might do so in an unsafe manner is a security vulnerability in those clients and should be reported to the appropriate vendor. If the vendor(s) of the vulnerable client(s) are unwilling to fix this vulnerability there are multiple ways that it could be mitigated. For example, with a filter that always sets the character set. Kindly send documents that will assist us in resolving these vulnerabilities Kind Regards