You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "Troy Melhase (JIRA)" <ji...@apache.org> on 2019/04/23 21:37:00 UTC

[jira] [Updated] (NIFI-6238) Escape HTTP header names in InvokeHTTP processor

     [ https://issues.apache.org/jira/browse/NIFI-6238?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Troy Melhase updated NIFI-6238:
-------------------------------
         Labels: InvokeHTTP hostname http security  (was: )
    Component/s: Extensions

> Escape HTTP header names in InvokeHTTP processor
> ------------------------------------------------
>
>                 Key: NIFI-6238
>                 URL: https://issues.apache.org/jira/browse/NIFI-6238
>             Project: Apache NiFi
>          Issue Type: Improvement
>          Components: Extensions
>    Affects Versions: 1.9.2
>            Reporter: Troy Melhase
>            Assignee: Troy Melhase
>            Priority: Major
>              Labels: InvokeHTTP, hostname, http, security
>
> HTTP headers are not checked/escaped during `InvokeHTTP.setHeaderProperties`.  When applying dynamic properties as HTTP headers, invalid headers break the request, for example "Trusted Host".
>  
> In lieu of setting the header name directly, the header name should be escaped and then set.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)