[ 
https://issues.apache.org/jira/browse/MESOS-5918?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16250447#comment-16250447
 ] 

Alexander Rojas commented on MESOS-5918:
----------------------------------------

For backwards compatibility i think it will be a while before we can completely 
remove the {{jsonp}} parameter from our codebase, however that doesn't mean we 
cannot mitigate the problem of the possible attacks by properly treating the 
{{jsonp}} parameter.

As it is currently implemented, we just return whatever value was given in the 
parameter, e.g.:

{code}
return OK(_flags(), request.url.query.get("jsonp"));
{code}

But we should probably parse that {{jsonp}} is just a JS identifier. Apparently 
just Internet Explorer up to version 11 is vulnerable to this attack.

> Replace jsonp with a more secure alternative
> --------------------------------------------
>
>                 Key: MESOS-5918
>                 URL: https://issues.apache.org/jira/browse/MESOS-5918
>             Project: Mesos
>          Issue Type: Improvement
>          Components: webui
>            Reporter: Yan Xu
>
> We currently use the {{jsonp}} technique to bypass CORS check. This practice 
> has many security concerns (see discussions on MESOS-5911) so we should 
> replace it with a better alternative.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to