[ 
https://issues.apache.org/jira/browse/DRILL-7351?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Don Perial updated DRILL-7351:
------------------------------
    Description: 
There is no way to protect the WebUI from CSRF and the fact that the value for 
the access-control-allow-origin header is '*' appears to confound this issue as 
well.

The attached file demonstrates the vulnerability.

Steps to replicate:
 # Login to an instance of the Drill WebUI.
 # Edit the attached [^drill-csrf.html]. Replace DRILL_HOST with the hostname 
of the Drill WebUI from step #1.
 # Load the file from #2 in the same browser as #1 either new tab or same 
window will do.
 # Return to the Drill WebUI and click on 'Profiles'.

Observed results:

The query 'SELECT 100' appears in the list of executed queries (see:  [^Screen 
Shot 2019-08-19 at 10.11.50 AM.png] ).

Expected results:

It should be possible to whitelist or completely restrict code from other 
domain names to submit queries to the WebUI.

Risks:

Potential for code execution by unauthorized parties.

 

 

  was:
There is no way to protect the WebUI from CSRF and the fact that the value for 
the access-control-allow-origin header is '*' appears to confound this issue as 
well.

The attached file demonstrates the vulnerability.

Steps to replicate:

1. Edit the attached [^drill-csrf.html]


> WebUI is Vulnerable to CSRF
> ---------------------------
>
>                 Key: DRILL-7351
>                 URL: https://issues.apache.org/jira/browse/DRILL-7351
>             Project: Apache Drill
>          Issue Type: Bug
>          Components: Web Server
>    Affects Versions: 1.16.0
>            Reporter: Don Perial
>            Priority: Major
>         Attachments: Screen Shot 2019-08-19 at 10.11.50 AM.png, 
> drill-csrf.html
>
>
> There is no way to protect the WebUI from CSRF and the fact that the value 
> for the access-control-allow-origin header is '*' appears to confound this 
> issue as well.
> The attached file demonstrates the vulnerability.
> Steps to replicate:
>  # Login to an instance of the Drill WebUI.
>  # Edit the attached [^drill-csrf.html]. Replace DRILL_HOST with the hostname 
> of the Drill WebUI from step #1.
>  # Load the file from #2 in the same browser as #1 either new tab or same 
> window will do.
>  # Return to the Drill WebUI and click on 'Profiles'.
> Observed results:
> The query 'SELECT 100' appears in the list of executed queries (see:  
> [^Screen Shot 2019-08-19 at 10.11.50 AM.png] ).
> Expected results:
> It should be possible to whitelist or completely restrict code from other 
> domain names to submit queries to the WebUI.
> Risks:
> Potential for code execution by unauthorized parties.
>  
>  



--
This message was sent by Atlassian JIRA
(v7.6.14#76016)

Reply via email to