You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@storm.apache.org by "Derek Dagit (JIRA)" <ji...@apache.org> on 2014/09/05 17:43:28 UTC
[jira] [Resolved] (STORM-460) CSRF vulnerability in storm UI
[ https://issues.apache.org/jira/browse/STORM-460?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Derek Dagit resolved STORM-460.
-------------------------------
Resolution: Fixed
Fix Version/s: feature-security
Assignee: Parth Brahmbhatt
Thanks Parth, I merged this to security branch.
> CSRF vulnerability in storm UI
> ------------------------------
>
> Key: STORM-460
> URL: https://issues.apache.org/jira/browse/STORM-460
> Project: Apache Storm (Incubating)
> Issue Type: Bug
> Affects Versions: feature-security
> Reporter: Parth Brahmbhatt
> Assignee: Parth Brahmbhatt
> Fix For: feature-security
>
>
> If you are already kerberized and visit a webpage that malliciosly posts this request
> http://storm-ui-root/api/v1/topology/storm-6-1406915499/kill/30
> it will end up killing a topology with id storm-6-1406915499.
> To reproduce the issue, open storm ui in secure or non secure mode once using any browser. You can then close the storm ui tab. Usig chrome https://chrome.google.com/webstore/detail/postman-rest-client/fdmmgilgnpjigdojojpjoooidkmcomcm or curl post this request
> http://<storm-ui-root>/api/v1/topology/<your topology id>/kill/30
> It should end up killing the topology.
> See http://en.wikipedia.org/wiki/Cross-site_request_forgery to understand CSRF vulenrability.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)