chenyu-opensource commented on PR #43169:
URL: https://github.com/apache/spark/pull/43169#issuecomment-1752241889

   > What 'trusts' a host header in Spark? what happens if it's spoofed? This 
is still not explaining the issue.
   
   What I mean is that there are no restrictions on request headers in Spark 
itself, which means that the client can freely pass through the server, so 
attackers can use this variable parameter to attack.
   This pr helps us that when setting the parameter 'host' in HTTP header 
request, we can verify this parameter instead of directly letting it pass.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to