[ 
https://issues.apache.org/jira/browse/KYLIN-1654?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ted Yu updated KYLIN-1654:
--------------------------
    Description: 
Currently commons-httpclient 3.1 is used.

This is already end-of-life by apache.

We should move to 4.3.6 or later.

    https://issues.apache.org/jira/browse/HADOOP-12767
    and to move the uses of httpclient 
https://issues.apache.org/jira/browse/HADOOP-10105

    https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 : 
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents 
HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting 
during an SSL handshake, which allows remote attackers to cause a denial of 
service (HTTPS call hang) via unspecified vectors.

    https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153
    https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783

    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service 
(FPS) merchant Java SDK and other products, does not verify that the server 
hostname matches a domain name in the subject's Common Name (CN) or 
subjectAltName field of the X.509 certificate, which allows man-in-the-middle 
attackers to spoof SSL servers via an arbitrary valid certificate.

  was:
Currently commons-httpclient 3.1 is used.

This is already end-of-life by apache.

We should move to 4.3.6 or later.

    https://issues.apache.org/jira/browse/HADOOP-12767
    and to move the uses of httpclient 
https://issues.apache.org/jira/browse/HADOOP-10105

    https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 : 
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents 
HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting 
during an SSL handshake, which allows remote attackers to cause a denial of 
service (HTTPS call hang) via unspecified vectors.

    https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153
    https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783
    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service 
(FPS) merchant Java SDK and other products, does not verify that the server 
hostname matches a domain name in the subject's Common Name (CN) or 
subjectAltName field of the X.509 certificate, which allows man-in-the-middle 
attackers to spoof SSL servers via an arbitrary valid certificate.


> Upgrade httpclient dependency
> -----------------------------
>
>                 Key: KYLIN-1654
>                 URL: https://issues.apache.org/jira/browse/KYLIN-1654
>             Project: Kylin
>          Issue Type: Task
>            Reporter: Ted Yu
>            Assignee: hongbin ma
>              Labels: newbie
>
> Currently commons-httpclient 3.1 is used.
> This is already end-of-life by apache.
> We should move to 4.3.6 or later.
>     https://issues.apache.org/jira/browse/HADOOP-12767
>     and to move the uses of httpclient 
> https://issues.apache.org/jira/browse/HADOOP-10105
>     https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 : 
> http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents 
> HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting 
> during an SSL handshake, which allows remote attackers to cause a denial of 
> service (HTTPS call hang) via unspecified vectors.
>     https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153
>     https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783
>     Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments 
> Service (FPS) merchant Java SDK and other products, does not verify that the 
> server hostname matches a domain name in the subject's Common Name (CN) or 
> subjectAltName field of the X.509 certificate, which allows man-in-the-middle 
> attackers to spoof SSL servers via an arbitrary valid certificate.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to