[ 
https://issues.apache.org/jira/browse/HBASE-15187?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15243487#comment-15243487
 ] 

Hudson commented on HBASE-15187:
--------------------------------

FAILURE: Integrated in HBase-Trunk_matrix #850 (See 
[https://builds.apache.org/job/HBase-Trunk_matrix/850/])
HBASE-15187 Integrate CSRF prevention filter to REST gateway (tedyu: rev 
6930da781b2142ed8a0e6fc67095453dea38a072)
* 
hbase-rest/src/main/java/org/apache/hadoop/hbase/rest/filter/RestCsrfPreventionFilter.java
* hbase-common/src/main/resources/hbase-default.xml
* hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/TestSchemaResource.java
* hbase-rest/src/main/java/org/apache/hadoop/hbase/rest/RESTServer.java
* 
hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/TestMultiRowResource.java
* 
hbase-rest/src/test/java/org/apache/hadoop/hbase/rest/HBaseRESTTestingUtility.java
* hbase-rest/src/main/java/org/apache/hadoop/hbase/rest/client/Client.java


> Integrate CSRF prevention filter to REST gateway
> ------------------------------------------------
>
>                 Key: HBASE-15187
>                 URL: https://issues.apache.org/jira/browse/HBASE-15187
>             Project: HBase
>          Issue Type: Bug
>            Reporter: Ted Yu
>            Assignee: Ted Yu
>              Labels: rest
>             Fix For: 2.0.0
>
>         Attachments: HBASE-15187-branch-1.v13.patch, HBASE-15187.v1.patch, 
> HBASE-15187.v10.patch, HBASE-15187.v10.patch, HBASE-15187.v11.patch, 
> HBASE-15187.v12.patch, HBASE-15187.v13.patch, HBASE-15187.v14.patch, 
> HBASE-15187.v2.patch, HBASE-15187.v3.patch, HBASE-15187.v4.patch, 
> HBASE-15187.v5.patch, HBASE-15187.v6.patch, HBASE-15187.v7.patch, 
> HBASE-15187.v8.patch, HBASE-15187.v9.patch
>
>
> HADOOP-12691 introduced a filter in Hadoop Common to help REST APIs guard 
> against cross-site request forgery attacks.
> This issue tracks the integration of that filter into HBase REST gateway.
> From REST section of refguide:
> To delete a table, use a DELETE request with the /schema endpoint:
> http://example.com:8000<table>/schema
> Suppose an attacker hosts a malicious web form on a domain under his control. 
> The form uses the DELETE action targeting a REST URL. Through social 
> engineering, the attacker tricks an authenticated user into accessing the 
> form and submitting it.
> The browser sends the HTTP DELETE request to the REST gateway.
> At REST gateway, the call is executed and user table is dropped



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to