accumulo-notifications mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Josh Elser (JIRA)" <j...@apache.org>
Subject [jira] [Resolved] (ACCUMULO-2785) ShellServlet vulnerable to CSRF
Date Sat, 24 May 2014 00:32:03 GMT

     [ https://issues.apache.org/jira/browse/ACCUMULO-2785?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Josh Elser resolved ACCUMULO-2785.
----------------------------------

    Resolution: Fixed

Set a random UUID as a csrf token when we start a session, and then include that token with
all future requests.

> ShellServlet vulnerable to CSRF
> -------------------------------
>
>                 Key: ACCUMULO-2785
>                 URL: https://issues.apache.org/jira/browse/ACCUMULO-2785
>             Project: Accumulo
>          Issue Type: Bug
>          Components: monitor
>    Affects Versions: 1.5.1, 1.6.0
>            Reporter: Josh Elser
>            Assignee: Josh Elser
>             Fix For: 1.5.2, 1.6.1, 1.7.0
>
>
> Noticed that the ShellServlet doesn't include any sort of CSRF token to prevent an attack,
but just uses the state of the session to determine authentication.
> I believe this means that the servlet is potentially vulnerable to a csrf attack. CORS
protects against the majority of this, I haven't been able to come up with a plausible vector
for an actual attack yet, but it would be good to clean up.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Mime
View raw message