[ 
https://issues.apache.org/jira/browse/NIFI-5374?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16540990#comment-16540990
 ] 

ASF subversion and git services commented on NIFI-5374:
-------------------------------------------------------

Commit b46033be306b2ce66c3316b2f4fec92b941307ac in nifi's branch 
refs/heads/support/nifi-1.7.x from thenatog
[ https://git-wip-us.apache.org/repos/asf?p=nifi.git;h=b46033b ]

NIFI-5374 - Added ExceptionFilter which catches RequestRejectedException thrown 
in the nifi-api Jersey code. These exceptions were not caught by the Jetty 
error-page configuration because they're thrown before the endpoint/Jetty 
routing is hit.
Added integration test for checking the ExceptionFilter catches malicious 
string exceptions.
Made minor changes to PR 2840 for code style.

This closes #2840.

Co-authored-by: Andy LoPresto <[email protected]>

Signed-off-by: Andy LoPresto <[email protected]>


> Suppress stacktrace being returned to remote client when using NiFi REST API
> ----------------------------------------------------------------------------
>
>                 Key: NIFI-5374
>                 URL: https://issues.apache.org/jira/browse/NIFI-5374
>             Project: Apache NiFi
>          Issue Type: Improvement
>          Components: Core Framework
>    Affects Versions: 1.7.0
>            Reporter: Nathan Gough
>            Assignee: Nathan Gough
>            Priority: Minor
>              Labels: filter, stacktrace, suppress
>             Fix For: 1.8.0, 1.7.1
>
>         Attachments: image001.png
>
>
> When a remote user attempts to use an endpoint with a malicious string, Jetty 
> will return a full stacktrace of the error. This provides the remote user 
> with excess information that can be used when attempting to manipulate a 
> system.
> !image001.png!
> This stacktrace should be logged only to the nifi-app.log and the stacktrace 
> suppressed before returning a 500 error to the user.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to