You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "Troy Melhase (JIRA)" <ji...@apache.org> on 2019/04/23 21:37:00 UTC
[jira] [Updated] (NIFI-6238) Escape HTTP header names in InvokeHTTP
processor
[ https://issues.apache.org/jira/browse/NIFI-6238?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Troy Melhase updated NIFI-6238:
-------------------------------
Labels: InvokeHTTP hostname http security (was: )
Component/s: Extensions
> Escape HTTP header names in InvokeHTTP processor
> ------------------------------------------------
>
> Key: NIFI-6238
> URL: https://issues.apache.org/jira/browse/NIFI-6238
> Project: Apache NiFi
> Issue Type: Improvement
> Components: Extensions
> Affects Versions: 1.9.2
> Reporter: Troy Melhase
> Assignee: Troy Melhase
> Priority: Major
> Labels: InvokeHTTP, hostname, http, security
>
> HTTP headers are not checked/escaped during `InvokeHTTP.setHeaderProperties`. When applying dynamic properties as HTTP headers, invalid headers break the request, for example "Trusted Host".
>
> In lieu of setting the header name directly, the header name should be escaped and then set.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)