[
https://issues.apache.org/jira/browse/HBASE-15187?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15243487#comment-15243487
]
Hudson commented on HBASE-15187:
--------------------------------
FAILURE: Integrated in HBase-Trunk_matrix #850 (See
[https://builds.apache.org/job/HBase-Trunk_matrix/850/])
HBASE-15187 Integrate CSRF prevention filter to REST gateway (tedyu: rev
6930da781b2142ed8a0e6fc67095453dea38a072)
*
hbase-rest/src/main/java/org/apache/hadoop/hbase/rest/filter/RestCsrfPreventionFilter.java
* hbase-common/src/main/resources/hbase-default.xml
* hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/TestSchemaResource.java
* hbase-rest/src/main/java/org/apache/hadoop/hbase/rest/RESTServer.java
*
hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/TestMultiRowResource.java
*
hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/HBaseRESTTestingUtility.java
* hbase-rest/src/main/java/org/apache/hadoop/hbase/rest/client/Client.java
> Integrate CSRF prevention filter to REST gateway
> ------------------------------------------------
>
> Key: HBASE-15187
> URL: https://issues.apache.org/jira/browse/HBASE-15187
> Project: HBase
> Issue Type: Bug
> Reporter: Ted Yu
> Assignee: Ted Yu
> Labels: rest
> Fix For: 2.0.0
>
> Attachments: HBASE-15187-branch-1.v13.patch, HBASE-15187.v1.patch,
> HBASE-15187.v10.patch, HBASE-15187.v10.patch, HBASE-15187.v11.patch,
> HBASE-15187.v12.patch, HBASE-15187.v13.patch, HBASE-15187.v14.patch,
> HBASE-15187.v2.patch, HBASE-15187.v3.patch, HBASE-15187.v4.patch,
> HBASE-15187.v5.patch, HBASE-15187.v6.patch, HBASE-15187.v7.patch,
> HBASE-15187.v8.patch, HBASE-15187.v9.patch
>
>
> HADOOP-12691 introduced a filter in Hadoop Common to help REST APIs guard
> against cross-site request forgery attacks.
> This issue tracks the integration of that filter into HBase REST gateway.
> From REST section of refguide:
> To delete a table, use a DELETE request with the /schema endpoint:
> http://example.com:8000<table>/schema
> Suppose an attacker hosts a malicious web form on a domain under his control.
> The form uses the DELETE action targeting a REST URL. Through social
> engineering, the attacker tricks an authenticated user into accessing the
> form and submitting it.
> The browser sends the HTTP DELETE request to the REST gateway.
> At REST gateway, the call is executed and user table is dropped
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)