The thing I'm still utterly unclear about is how simply logging traffic could, by itself, create a vulnerability.

In our case, the log entries are not even viewable unless you are signed on to a command line session on the server (ssh for headless Linux; a physical Twinax terminal, or a 5250 emulator of some sort, for IBM Midrange).

How can a log entry be executed as a command, anyway?

--
JHHL

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to