hadoop-hdfs-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Vivek Ganesan (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (HDFS-4901) Site Scripting and Phishing Through Frames in browseDirectory.jsp
Date Tue, 23 Jul 2013 16:45:13 GMT

     [ https://issues.apache.org/jira/browse/HDFS-4901?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Vivek Ganesan updated HDFS-4901:
--------------------------------

    Status: Patch Available  (was: In Progress)

Local Patch Validation Results : 

{color:red}-1 overall{color}.  

    {color:green}+1 @author{color}.  The patch does not contain any @author tags.

    {color:green}+1 tests included{color}.  The patch appears to include 1 new or modified
test files.

    {color:green}+1 javac{color}.  The applied patch does not increase the total number of
javac compiler warnings.

    {color:red}-1 javadoc{color}.  The javadoc tool appears to have generated 43 warning messages.

    {color:green}+1 eclipse:eclipse{color}.  The patch built with eclipse:eclipse.

    {color:green}+1 findbugs{color}.  The patch does not introduce any new Findbugs (version
) warnings.

    {color:green}+1 release audit{color}.  The applied patch does not increase the total number
of release audit warnings.

Request review for the patch (following http://wiki.apache.org/hadoop/CodeReviewChecklist)
                
> Site Scripting and Phishing Through Frames in browseDirectory.jsp
> -----------------------------------------------------------------
>
>                 Key: HDFS-4901
>                 URL: https://issues.apache.org/jira/browse/HDFS-4901
>             Project: Hadoop HDFS
>          Issue Type: Bug
>          Components: security, webhdfs
>    Affects Versions: 2.0.3-alpha, 1.1.1
>            Reporter: Jeffrey E  Rodriguez
>            Assignee: Vivek Ganesan
>         Attachments: HDFS-4901.patch
>
>   Original Estimate: 24h
>          Time Spent: 24h
>  Remaining Estimate: 0h
>
> It is possible to steal or manipulate customer session and cookies, which might be used
to impersonate a legitimate user,
> allowing the hacker to view or alter user records, and to perform transactions as that
user.
> e.g.
> GET /browseDirectory.jsp? dir=%2Fhadoop'"/><script>alert(759)</script>
&namenodeInfoPort=50070
> Also;
> Phishing Through Frames
> Try:
> GET /browseDirectory.jsp? dir=%2Fhadoop%27%22%3E%3Ciframe+src%3Dhttp%3A%2F%2Fdemo.testfire.net%2Fphishing.html%3E
> &namenodeInfoPort=50070 HTTP/1.1
> Cookie: JSESSIONID=qd9i8tuccuam1cme71swr9nfi
> Accept-Language: en-US
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message