[jira] [Updated] (KNOX-2234) Omitting cookie from outbound request header

2020-02-25 Thread Kevin Risden (Jira)


 [ 
https://issues.apache.org/jira/browse/KNOX-2234?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden updated KNOX-2234:
---
Resolution: Not A Bug
Status: Resolved  (was: Patch Available)

Marking as "Not a Bug" since this is working as designed. It requires a lot 
more thought into where cookies should be removed if they are going to be 
completely removed from dispatch in Knox.

> Omitting cookie from outbound request header
> 
>
> Key: KNOX-2234
> URL: https://issues.apache.org/jira/browse/KNOX-2234
> Project: Apache Knox
>  Issue Type: Improvement
>Affects Versions: 1.2.0, 1.3.0
>Reporter: James Chen
>Priority: Minor
>  Labels: easy-fix
> Attachments: KNOX-2234.patch
>
>   Original Estimate: 168h
>  Remaining Estimate: 168h
>
> It is possible for an attacker to directly steal user session information by 
> having a user visit or load a URL using Knox, as cookies are forwarded in the 
> header on the outbound request. This behavior doesn't seem to serve any 
> particular function either, as the endpoint Knox tries to contact shouldn't 
> need any authentication by Knox. We suggest that user-Knox cookies should be 
> omitted from the outbound request.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (KNOX-2234) Omitting cookie from outbound request header

2020-02-13 Thread James Chen (Jira)


 [ 
https://issues.apache.org/jira/browse/KNOX-2234?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Chen updated KNOX-2234:
-
Attachment: KNOX-2234.patch
Status: Patch Available  (was: Open)

> Omitting cookie from outbound request header
> 
>
> Key: KNOX-2234
> URL: https://issues.apache.org/jira/browse/KNOX-2234
> Project: Apache Knox
>  Issue Type: Improvement
>Affects Versions: 1.3.0, 1.2.0
>Reporter: James Chen
>Priority: Minor
>  Labels: easy-fix
> Attachments: KNOX-2234.patch
>
>   Original Estimate: 168h
>  Remaining Estimate: 168h
>
> It is possible for an attacker to directly steal user session information by 
> having a user visit or load a URL using Knox, as cookies are forwarded in the 
> header on the outbound request. This behavior doesn't seem to serve any 
> particular function either, as the endpoint Knox tries to contact shouldn't 
> need any authentication by Knox. We suggest that user-Knox cookies should be 
> omitted from the outbound request.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (KNOX-2234) Omitting cookie from outbound request header

2020-02-13 Thread James Chen (Jira)


 [ 
https://issues.apache.org/jira/browse/KNOX-2234?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Chen updated KNOX-2234:
-
Attachment: (was: KNOX-2234.patch)

> Omitting cookie from outbound request header
> 
>
> Key: KNOX-2234
> URL: https://issues.apache.org/jira/browse/KNOX-2234
> Project: Apache Knox
>  Issue Type: Improvement
>Affects Versions: 1.2.0, 1.3.0
>Reporter: James Chen
>Priority: Minor
>  Labels: easy-fix
> Attachments: KNOX-2234.patch
>
>   Original Estimate: 168h
>  Remaining Estimate: 168h
>
> It is possible for an attacker to directly steal user session information by 
> having a user visit or load a URL using Knox, as cookies are forwarded in the 
> header on the outbound request. This behavior doesn't seem to serve any 
> particular function either, as the endpoint Knox tries to contact shouldn't 
> need any authentication by Knox. We suggest that user-Knox cookies should be 
> omitted from the outbound request.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (KNOX-2234) Omitting cookie from outbound request header

2020-02-13 Thread James Chen (Jira)


 [ 
https://issues.apache.org/jira/browse/KNOX-2234?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Chen updated KNOX-2234:
-
Attachment: cookiepatch.patch

> Omitting cookie from outbound request header
> 
>
> Key: KNOX-2234
> URL: https://issues.apache.org/jira/browse/KNOX-2234
> Project: Apache Knox
>  Issue Type: Improvement
>Affects Versions: 1.2.0, 1.3.0
>Reporter: James Chen
>Priority: Minor
>  Labels: easy-fix
> Attachments: KNOX-2234.patch
>
>   Original Estimate: 168h
>  Remaining Estimate: 168h
>
> It is possible for an attacker to directly steal user session information by 
> having a user visit or load a URL using Knox, as cookies are forwarded in the 
> header on the outbound request. This behavior doesn't seem to serve any 
> particular function either, as the endpoint Knox tries to contact shouldn't 
> need any authentication by Knox. We suggest that user-Knox cookies should be 
> omitted from the outbound request.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (KNOX-2234) Omitting cookie from outbound request header

2020-02-13 Thread James Chen (Jira)


 [ 
https://issues.apache.org/jira/browse/KNOX-2234?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Chen updated KNOX-2234:
-
Attachment: KNOX-2234.patch

> Omitting cookie from outbound request header
> 
>
> Key: KNOX-2234
> URL: https://issues.apache.org/jira/browse/KNOX-2234
> Project: Apache Knox
>  Issue Type: Improvement
>Affects Versions: 1.2.0, 1.3.0
>Reporter: James Chen
>Priority: Minor
>  Labels: easy-fix
> Attachments: KNOX-2234.patch
>
>   Original Estimate: 168h
>  Remaining Estimate: 168h
>
> It is possible for an attacker to directly steal user session information by 
> having a user visit or load a URL using Knox, as cookies are forwarded in the 
> header on the outbound request. This behavior doesn't seem to serve any 
> particular function either, as the endpoint Knox tries to contact shouldn't 
> need any authentication by Knox. We suggest that user-Knox cookies should be 
> omitted from the outbound request.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (KNOX-2234) Omitting cookie from outbound request header

2020-02-13 Thread James Chen (Jira)


 [ 
https://issues.apache.org/jira/browse/KNOX-2234?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Chen updated KNOX-2234:
-
Attachment: (was: cookiepatch.patch)

> Omitting cookie from outbound request header
> 
>
> Key: KNOX-2234
> URL: https://issues.apache.org/jira/browse/KNOX-2234
> Project: Apache Knox
>  Issue Type: Improvement
>Affects Versions: 1.2.0, 1.3.0
>Reporter: James Chen
>Priority: Minor
>  Labels: easy-fix
> Attachments: KNOX-2234.patch
>
>   Original Estimate: 168h
>  Remaining Estimate: 168h
>
> It is possible for an attacker to directly steal user session information by 
> having a user visit or load a URL using Knox, as cookies are forwarded in the 
> header on the outbound request. This behavior doesn't seem to serve any 
> particular function either, as the endpoint Knox tries to contact shouldn't 
> need any authentication by Knox. We suggest that user-Knox cookies should be 
> omitted from the outbound request.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)