We have a few tomcat servers and we just discovered that some files that we don't want public to have access to those files. To exemplify:
Let say we have a folder /var/www/html/ that we are publishing through tomcat, but we don't want to expose /var/www/html/conf/dbinfo.txt. At this moment people is able to go to www.thissite.com/conf/dbinfo.txt and they are able to see things. I will like to be able to block it so does not shows it but it allows it to be read by tomcat itself.
Any help is appreciated.
Tomcat's file access is controlled by the security constraints section of WEB-INF/web.xml.
You can block
conf
this way:If you are using apache to serve static content, this will not work as apache will serve the conf files before tomcat gets the URL. In those cases, you would need to solve this via apache's http config files.
Hello to all the SysAdmin and IT Workers in this post. Thanks for your responses. Many of the replies to my questions were acceptable but this one was best suited for our production environment.
Ok. To block a directory or a file within a virtual host in server.xml you just have to add the following code to the server.xml in the tomcat/conf directory.
Before:
After:
So the answer to the question is add the following lines:
Why not store it outside your web directory structure? We never put anything under /var/www/html/ that we wouldn't want a user to discover.
Normally configuration information (like database connection information, ...) is stored in files under the WEB-INF folder of the WAR file deployed to Tomcat. Files under WEB-INF are not accessible to clients.
Word of advice. After you fix the permissions. Change all the passwords, and make SURE that there isn't a google cache of it.
Having the same issue, but I can't see how the accepted answer can really work. The valve invoked here applies to the ENTIRE webapp. Not part of it. So I'm assuming that in this case once it can't recognize the context as representing a webapp, it's simply ignoring the directive and throwing some comments in the log file.
You can block the directory in public access through server.xml file
Add this lines to that server.xml file
then access that http://localhost:8080/examples then it show as a 404 page error,ie) means blocked