Nick Gavalas created THRIFT-5710: ------------------------------------ Summary: NodeJS header transport leaks headers between all instances Key: THRIFT-5710 URL: https://issues.apache.org/jira/browse/THRIFT-5710 Project: Thrift Issue Type: Bug Components: Node.js - Library Affects Versions: 0.18.0, 0.17.0, 0.16.0, 0.15.0, 0.14.0, 0.19.0 Environment: This repros in all environments using the nodejs library. Reporter: Nick Gavalas
The header transport in `nodejs` has `TBufferTransport` and `TFramedTransport` improper extending the `THeaderTransport` prototype. The intention was to use `THeaderTransport` as an abstract base class and have concrete implementations in the other transports. In reality, every instance of `TBufferTransport` and `TFramedTransport` actually share a single instance of `THeaderTransport` being used as the prototype, which means that they all share one object that stores headers that every instance simultaneously mutates. This leaks headers on both the read and the write paths: * You can write incorrect headers to a transport that has written headers but hasn't flushed yet. This is especially troubling if the headers are used for auth, because you're able to mix up requests and auth as the wrong entity. (i.e., if two requests set an `Auth` header). * You can read headers from other requests. They only clobber each other if they have the same name, but the union of all seen headers is returned in {{getReadHeaders.}} The fix is straightforward but urgent: the header functionality is completely broken and a security risk to use in production. -- This message was sent by Atlassian Jira (v8.20.10#820010)