Richard Zang created AMBARI-12227:
-------------------------------------

             Summary: Kerberos Wizard: temporarily stores admin principal / 
password in browser's local storage
                 Key: AMBARI-12227
                 URL: https://issues.apache.org/jira/browse/AMBARI-12227
             Project: Ambari
          Issue Type: Bug
          Components: ambari-web
    Affects Versions: 2.0.0
            Reporter: Richard Zang
            Assignee: Richard Zang
            Priority: Critical
             Fix For: 2.1.1


Kerberos admin credentials are stored in the browser's local storage in plain 
text during Enable Kerberos Wizard. This is blown away when the user exits the 
wizard or on log out.
However, if there is a chance for an attacker without proper Ambari credentials 
to look at the Kerberos credentials. For example, the admin can launch Enable 
Kerberos Wizard and enters Kerberos admin credentials on the 2nd page, and goes 
forward. At this point, Kerberos admin crendentials are stored in browser's 
local storage. If the user walks away from his desk, the other user can look in 
the browser developer tools to find the Kerberos admin principal and password.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to