[
https://issues.apache.org/jira/browse/HBASE-15187?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15242067#comment-15242067
]
Ted Yu commented on HBASE-15187:
--------------------------------
The only change in RestCsrfPreventionFilter.java between the one in patch v13
and the one in hadoop is:
{code}
65c65
< static final String HEADER_DEFAULT = "X-XSRF-HEADER";
---
> public static final String HEADER_DEFAULT = "X-XSRF-HEADER";
{code}
I will include the above in the next patch.
Will add "hbase.rest.csrf.enabled" to hbase-default.xml
> Integrate CSRF prevention filter to REST gateway
> ------------------------------------------------
>
> Key: HBASE-15187
> URL: https://issues.apache.org/jira/browse/HBASE-15187
> Project: HBase
> Issue Type: Bug
> Reporter: Ted Yu
> Assignee: Ted Yu
> Labels: rest
> Fix For: 2.0.0
>
> Attachments: HBASE-15187-branch-1.v13.patch, HBASE-15187.v1.patch,
> HBASE-15187.v10.patch, HBASE-15187.v10.patch, HBASE-15187.v11.patch,
> HBASE-15187.v12.patch, HBASE-15187.v13.patch, HBASE-15187.v2.patch,
> HBASE-15187.v3.patch, HBASE-15187.v4.patch, HBASE-15187.v5.patch,
> HBASE-15187.v6.patch, HBASE-15187.v7.patch, HBASE-15187.v8.patch,
> HBASE-15187.v9.patch
>
>
> HADOOP-12691 introduced a filter in Hadoop Common to help REST APIs guard
> against cross-site request forgery attacks.
> This issue tracks the integration of that filter into HBase REST gateway.
> From REST section of refguide:
> To delete a table, use a DELETE request with the /schema endpoint:
> http://example.com:8000<table>/schema
> Suppose an attacker hosts a malicious web form on a domain under his control.
> The form uses the DELETE action targeting a REST URL. Through social
> engineering, the attacker tricks an authenticated user into accessing the
> form and submitting it.
> The browser sends the HTTP DELETE request to the REST gateway.
> At REST gateway, the call is executed and user table is dropped
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)