[
https://issues.apache.org/jira/browse/HDFS-4901?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14081864#comment-14081864
]
Hadoop QA commented on HDFS-4901:
---------------------------------
{color:red}-1 overall{color}. Here are the results of testing the latest
attachment
http://issues.apache.org/jira/secure/attachment/12627367/HDFS-4901_branch-1.2.patch
against trunk revision .
{color:red}-1 patch{color}. The patch command could not apply the patch.
Console output: https://builds.apache.org/job/PreCommit-HDFS-Build/7523//console
This message is automatically generated.
> Site Scripting and Phishing Through Frames in browseDirectory.jsp
> -----------------------------------------------------------------
>
> Key: HDFS-4901
> URL: https://issues.apache.org/jira/browse/HDFS-4901
> Project: Hadoop HDFS
> Issue Type: Bug
> Components: security, webhdfs
> Affects Versions: 1.2.1
> Reporter: Jeffrey E Rodriguez
> Assignee: Vivek Ganesan
> Priority: Blocker
> Attachments: HDFS-4901.patch, HDFS-4901.patch.1,
> HDFS-4901_branch-1.2.patch
>
> Original Estimate: 24h
> Time Spent: 24h
> Remaining Estimate: 0h
>
> It is possible to steal or manipulate customer session and cookies, which
> might be used to impersonate a legitimate user,
> allowing the hacker to view or alter user records, and to perform
> transactions as that user.
> e.g.
> GET /browseDirectory.jsp? dir=%2Fhadoop'"/><script>alert(759)</script>
> &namenodeInfoPort=50070
> Also;
> Phishing Through Frames
> Try:
> GET /browseDirectory.jsp?
> dir=%2Fhadoop%27%22%3E%3Ciframe+src%3Dhttp%3A%2F%2Fdemo.testfire.net%2Fphishing.html%3E
> &namenodeInfoPort=50070 HTTP/1.1
> Cookie: JSESSIONID=qd9i8tuccuam1cme71swr9nfi
> Accept-Language: en-US
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;
--
This message was sent by Atlassian JIRA
(v6.2#6252)