[
https://issues.apache.org/jira/browse/SPARK-15440?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15362025#comment-15362025
]
Apache Spark commented on SPARK-15440:
--------------------------------------
User 'yanboliang' has created a pull request for this issue:
https://github.com/apache/spark/pull/13218
> Add CSRF Filter for REST APIs to Spark
> --------------------------------------
>
> Key: SPARK-15440
> URL: https://issues.apache.org/jira/browse/SPARK-15440
> Project: Spark
> Issue Type: New Feature
> Components: Deploy, Spark Core
> Reporter: Yanbo Liang
>
> CSRF prevention for REST APIs can be provided through a common servlet
> filter. This filter would check for the existence of an custom HTTP header -
> such as X-XSRF-Header.
> The fact that CSRF attacks are entirely browser based means that the above
> approach can ensure that requests are coming from either: applications served
> by the same origin as the REST API or that there is explicit policy
> configuration that allows the setting of a header on XmlHttpRequest from
> another origin.
> We have done similar work for Hadoop
> (https://issues.apache.org/jira/browse/HADOOP-12691) and other components.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]