hadoop-hdfs-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Hadoop QA (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HDFS-4901) Site Scripting and Phishing Through Frames in browseDirectory.jsp
Date Tue, 23 Jul 2013 18:42:49 GMT

    [ https://issues.apache.org/jira/browse/HDFS-4901?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13716903#comment-13716903

Hadoop QA commented on HDFS-4901:

{color:green}+1 overall{color}.  Here are the results of testing the latest attachment 
  against trunk revision .

    {color:green}+1 @author{color}.  The patch does not contain any @author tags.

    {color:green}+1 tests included{color}.  The patch appears to include 1 new or modified
test files.

    {color:green}+1 javac{color}.  The applied patch does not increase the total number of
javac compiler warnings.

    {color:green}+1 javadoc{color}.  The javadoc tool did not generate any warning messages.

    {color:green}+1 eclipse:eclipse{color}.  The patch built with eclipse:eclipse.

    {color:green}+1 findbugs{color}.  The patch does not introduce any new Findbugs (version
1.3.9) warnings.

    {color:green}+1 release audit{color}.  The applied patch does not increase the total number
of release audit warnings.

    {color:green}+1 core tests{color}.  The patch passed unit tests in hadoop-hdfs-project/hadoop-hdfs.

    {color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: https://builds.apache.org/job/PreCommit-HDFS-Build/4712//testReport/
Console output: https://builds.apache.org/job/PreCommit-HDFS-Build/4712//console

This message is automatically generated.
> Site Scripting and Phishing Through Frames in browseDirectory.jsp
> -----------------------------------------------------------------
>                 Key: HDFS-4901
>                 URL: https://issues.apache.org/jira/browse/HDFS-4901
>             Project: Hadoop HDFS
>          Issue Type: Bug
>          Components: security, webhdfs
>    Affects Versions: 1.1.1, 2.0.3-alpha
>            Reporter: Jeffrey E  Rodriguez
>            Assignee: Vivek Ganesan
>         Attachments: HDFS-4901.patch
>   Original Estimate: 24h
>          Time Spent: 24h
>  Remaining Estimate: 0h
> It is possible to steal or manipulate customer session and cookies, which might be used
to impersonate a legitimate user,
> allowing the hacker to view or alter user records, and to perform transactions as that
> e.g.
> GET /browseDirectory.jsp? dir=%2Fhadoop'"/><script>alert(759)</script>
> Also;
> Phishing Through Frames
> Try:
> GET /browseDirectory.jsp? dir=%2Fhadoop%27%22%3E%3Ciframe+src%3Dhttp%3A%2F%2Fdemo.testfire.net%2Fphishing.html%3E
> &namenodeInfoPort=50070 HTTP/1.1
> Cookie: JSESSIONID=qd9i8tuccuam1cme71swr9nfi
> Accept-Language: en-US
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;

This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

View raw message