[ https://issues.apache.org/jira/browse/MAPREDUCE-3804?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13201645#comment-13201645 ]
Hadoop QA commented on MAPREDUCE-3804: -------------------------------------- -1 overall. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12513499/MAPREDUCE-3804.patch against trunk revision . +1 @author. The patch does not contain any @author tags. -1 tests included. The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch. +1 javadoc. The javadoc tool did not generate any warning messages. +1 javac. The applied patch does not increase the total number of javac compiler warnings. +1 eclipse:eclipse. The patch built with eclipse:eclipse. +1 findbugs. The patch does not introduce any new Findbugs (version 1.3.9) warnings. +1 release audit. The applied patch does not increase the total number of release audit warnings. -1 core tests. The patch failed these unit tests: org.apache.hadoop.yarn.server.nodemanager.containermanager.monitor.TestContainersMonitor +1 contrib tests. The patch passed contrib unit tests. Test results: https://builds.apache.org/job/PreCommit-MAPREDUCE-Build/1797//testReport/ Console output: https://builds.apache.org/job/PreCommit-MAPREDUCE-Build/1797//console This message is automatically generated. > yarn webapp interface vulnerable to cross scripting attacks > ----------------------------------------------------------- > > Key: MAPREDUCE-3804 > URL: https://issues.apache.org/jira/browse/MAPREDUCE-3804 > Project: Hadoop Map/Reduce > Issue Type: Bug > Components: jobhistoryserver, mrv2, resourcemanager > Affects Versions: 0.23.0 > Reporter: Dave Thompson > Assignee: Dave Thompson > Fix For: 0.23.1 > > Attachments: MAPREDUCE-3804.patch, MAPREDUCE-3804.patch, > MAPREDUCE_3804_br_0.23.0.patch > > > Yarn webapp interface may be vulnerable to certain cross scripting attacks, > injected through URL request. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira