hbase-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Ted Yu (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HBASE-15187) Integrate CSRF prevention filter to REST gateway
Date Thu, 14 Apr 2016 22:36:25 GMT

    [ https://issues.apache.org/jira/browse/HBASE-15187?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15242067#comment-15242067

Ted Yu commented on HBASE-15187:

The only change in RestCsrfPreventionFilter.java between the one in patch v13 and the one
in hadoop is:
<   static final String HEADER_DEFAULT = "X-XSRF-HEADER";
>   public static final String HEADER_DEFAULT = "X-XSRF-HEADER";
I will include the above in the next patch.

Will add "hbase.rest.csrf.enabled" to hbase-default.xml

> Integrate CSRF prevention filter to REST gateway
> ------------------------------------------------
>                 Key: HBASE-15187
>                 URL: https://issues.apache.org/jira/browse/HBASE-15187
>             Project: HBase
>          Issue Type: Bug
>            Reporter: Ted Yu
>            Assignee: Ted Yu
>              Labels: rest
>             Fix For: 2.0.0
>         Attachments: HBASE-15187-branch-1.v13.patch, HBASE-15187.v1.patch, HBASE-15187.v10.patch,
HBASE-15187.v10.patch, HBASE-15187.v11.patch, HBASE-15187.v12.patch, HBASE-15187.v13.patch,
HBASE-15187.v2.patch, HBASE-15187.v3.patch, HBASE-15187.v4.patch, HBASE-15187.v5.patch, HBASE-15187.v6.patch,
HBASE-15187.v7.patch, HBASE-15187.v8.patch, HBASE-15187.v9.patch
> HADOOP-12691 introduced a filter in Hadoop Common to help REST APIs guard against cross-site
request forgery attacks.
> This issue tracks the integration of that filter into HBase REST gateway.
> From REST section of refguide:
> To delete a table, use a DELETE request with the /schema endpoint:
> http://example.com:8000<table>/schema
> Suppose an attacker hosts a malicious web form on a domain under his control. The form
uses the DELETE action targeting a REST URL. Through social engineering, the attacker tricks
an authenticated user into accessing the form and submitting it.
> The browser sends the HTTP DELETE request to the REST gateway.
> At REST gateway, the call is executed and user table is dropped

This message was sent by Atlassian JIRA

View raw message