hadoop-common-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Hudson (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HADOOP-11385) Prevent cross site scripting attack on JMXJSONServlet
Date Fri, 19 Dec 2014 14:38:17 GMT

    [ https://issues.apache.org/jira/browse/HADOOP-11385?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14253458#comment-14253458
] 

Hudson commented on HADOOP-11385:
---------------------------------

FAILURE: Integrated in Hadoop-Hdfs-trunk-Java8 #43 (See [https://builds.apache.org/job/Hadoop-Hdfs-trunk-Java8/43/])
HADOOP-11385. Prevent cross site scripting attack on JMXJSONServlet. Contributed by Haohui
Mai. (wheat9: rev ef1fc51852cd2914accde4d80c2f496cd1ca042f)
* hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/jmx/JMXJsonServlet.java
* hadoop-common-project/hadoop-common/CHANGES.txt
* hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/jmx/TestJMXJsonServlet.java


> Prevent cross site scripting attack on JMXJSONServlet
> -----------------------------------------------------
>
>                 Key: HADOOP-11385
>                 URL: https://issues.apache.org/jira/browse/HADOOP-11385
>             Project: Hadoop Common
>          Issue Type: Bug
>            Reporter: Haohui Mai
>            Assignee: Haohui Mai
>            Priority: Critical
>             Fix For: 2.7.0
>
>         Attachments: HADOOP-11385.000.patch
>
>
> JMXJSONServlet allows passing a callback parameter in the JMX response, which is introduced
in HADOOP-8922:
> {code}
>         // "callback" parameter implies JSONP outpout
>         jsonpcb = request.getParameter(CALLBACK_PARAM);
>         if (jsonpcb != null) {
>           response.setContentType("application/javascript; charset=utf8");
>           writer.write(jsonpcb + "(");
>         } else {
>           response.setContentType("application/json; charset=utf8");
>         }
> {code}
> The code writes the callback parameter directly to the output, allowing cross-site scripting
attack. This vulnerability allows the attacker easily stealing the credential of the user
on the browser.
> The original use case can be supported using Cross-origin resource sharing (CORS), which
is used by the current NN web UI.
> This jira proposes to move JMXJSONServlet to CORS.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message