[ 
https://issues.apache.org/jira/browse/SENTRY-960?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15020304#comment-15020304
 ] 

Lenni Kuff commented on SENTRY-960:
-----------------------------------

thanks for posting both options Sravya. I think the whitelist approach is 
safer, albeit a bit more invasive. I'm worried that with the blacklist approach 
we might have an unexpected vulnerability in the future.

+1, but could you add a comment on what functions you are excluding from the 
whitelist? Alternatively, you could emit both blacklist and whitelist 
(blacklist takes precedence). This will help make it clear which functions we 
want to protect against executing and which ones are safe.



> Sentry no longer enforces it's whitelist
> ----------------------------------------
>
>                 Key: SENTRY-960
>                 URL: https://issues.apache.org/jira/browse/SENTRY-960
>             Project: Sentry
>          Issue Type: Bug
>          Components: Sentry
>            Reporter: Ryan P
>            Assignee: Sravya Tirukkovalur
>         Attachments: SENTRY-960.10.patch, SENTRY-960.11.patch, 
> SENTRY-960.2.patch, SENTRY-960.3.patch, SENTRY-960.4.patch, 
> SENTRY-960.4.patch, SENTRY-960.5.patch, SENTRY-960.6.patch, 
> SENTRY-960.7.patch, SENTRY-960.8.patch, SENTRY-960.9.patch, SENTRY-960.patch
>
>
> HiveSemanticAnalyzerHookContext no longer includes built-in functions as an 
> input to it's Read Entities. This change hides built in functions from 
> HiveAuthzBindingHook which is a huge security hole. 
> Failing to enforce the whitelist will allow users to execute such functions 
> as REFLECT and JAVA_METHOD. 
> https://cwiki.apache.org/confluence/display/Hive/ReflectUDF



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to