[
https://issues.apache.org/jira/browse/HADOOP-11385?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14252126#comment-14252126
]
Hudson commented on HADOOP-11385:
---------------------------------
FAILURE: Integrated in Hadoop-trunk-Commit #6750 (See
[https://builds.apache.org/job/Hadoop-trunk-Commit/6750/])
HADOOP-11385. Prevent cross site scripting attack on JMXJSONServlet.
Contributed by Haohui Mai. (wheat9: rev
ef1fc51852cd2914accde4d80c2f496cd1ca042f)
*
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/jmx/JMXJsonServlet.java
*
hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/jmx/TestJMXJsonServlet.java
* hadoop-common-project/hadoop-common/CHANGES.txt
> Prevent cross site scripting attack on JMXJSONServlet
> -----------------------------------------------------
>
> Key: HADOOP-11385
> URL: https://issues.apache.org/jira/browse/HADOOP-11385
> Project: Hadoop Common
> Issue Type: Bug
> Reporter: Haohui Mai
> Assignee: Haohui Mai
> Priority: Critical
> Fix For: 2.7.0
>
> Attachments: HADOOP-11385.000.patch
>
>
> JMXJSONServlet allows passing a callback parameter in the JMX response, which
> is introduced in HADOOP-8922:
> {code}
> // "callback" parameter implies JSONP outpout
> jsonpcb = request.getParameter(CALLBACK_PARAM);
> if (jsonpcb != null) {
> response.setContentType("application/javascript; charset=utf8");
> writer.write(jsonpcb + "(");
> } else {
> response.setContentType("application/json; charset=utf8");
> }
> {code}
> The code writes the callback parameter directly to the output, allowing
> cross-site scripting attack. This vulnerability allows the attacker easily
> stealing the credential of the user on the browser.
> The original use case can be supported using Cross-origin resource sharing
> (CORS), which is used by the current NN web UI.
> This jira proposes to move JMXJSONServlet to CORS.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)