[
https://issues.apache.org/jira/browse/YARN-2528?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14128026#comment-14128026
]
Zhijie Shen commented on YARN-2528:
-----------------------------------
[~jeagles], no problem. I compared our CrossOriginFilter with the one in
Jetty. That one seems not to do any post-process for the string obtained from
ORIGIN header. What's the reason that we need for our CrossOriginFilter?
According to test case, you want to avoid the issue that the string contains
the other header, don't you? HttpServletResponse.getHeader doesn't handle
header splitting properly?
BTW, it seems that ours' only allows one origin in the request header, but
Jetty's allows multiple one. And I find a specification:
http://tools.ietf.org/html/draft-abarth-origin-09, which tells that ORIGIN can
be a list. Any thought?
> Cross Origin Filter Http response split vulnerability protection rejects
> valid origins
> --------------------------------------------------------------------------------------
>
> Key: YARN-2528
> URL: https://issues.apache.org/jira/browse/YARN-2528
> Project: Hadoop YARN
> Issue Type: Sub-task
> Components: timelineserver
> Reporter: Jonathan Eagles
> Assignee: Jonathan Eagles
> Attachments: YARN-2528-v1.patch
>
>
> URLEncoding is too strong of a protection for HTTP Response Split
> Vulnerability protection and major browser reject the encoded Origin. An
> adequate protection is simply to remove all CRs LFs as in the case of PHP's
> header function.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)