[ 
https://issues.apache.org/jira/browse/STORM-460?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14111192#comment-14111192
 ] 

ASF GitHub Bot commented on STORM-460:
--------------------------------------

Github user harshach commented on a diff in the pull request:

    https://github.com/apache/incubator-storm/pull/230#discussion_r16736988
  
    --- Diff: storm-core/src/clj/backtype/storm/ui/core.clj ---
    @@ -687,7 +688,8 @@
             "bolts" (bolt-comp id bolt-comp-summs (.get_errors summ) window 
include-sys?)
             "configuration" topology-conf
             "visualizationTable" (stream-boxes visualizer-data)
    -        "uiActionsEnabled" (ui-actions-enabled?)}))))
    +        "uiActionsEnabled" (ui-actions-enabled?)
    +        "anti-forgery-token" *anti-forgery-token*}))))
    --- End diff --
    
    can you rename this to antiForgeryToken


> CSRF vulnerability in storm UI
> ------------------------------
>
>                 Key: STORM-460
>                 URL: https://issues.apache.org/jira/browse/STORM-460
>             Project: Apache Storm (Incubating)
>          Issue Type: Bug
>    Affects Versions: feature-security
>            Reporter: Parth Brahmbhatt
>
>  If you are already kerberized and visit a webpage that malliciosly posts 
> this request
> http://storm-ui-root/api/v1/topology/storm-6-1406915499/kill/30
> it will end up killing a topology with id storm-6-1406915499. 
> To reproduce the issue, open storm ui in secure or non secure mode once using 
> any browser. You can then close the storm ui tab. Usig chrome 
> https://chrome.google.com/webstore/detail/postman-rest-client/fdmmgilgnpjigdojojpjoooidkmcomcm
>  or curl post this request 
> http://<storm-ui-root>/api/v1/topology/<your topology id>/kill/30
> It should end up killing the topology.
> See http://en.wikipedia.org/wiki/Cross-site_request_forgery to understand 
> CSRF vulenrability.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to