[ https://issues.apache.org/jira/browse/MAPREDUCE-4572?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Todd Lipcon reopened MAPREDUCE-4572: ------------------------------------ I'm concerned this might be a security hole. Are there any user-writable places that are served by jetty's file servlet? I think the user might be able to do something like drop a symlink into their log directory which points to the TT's keytab or another user's tokens. Without using the SecureIOUtils, this attack seems likely. I think we should revert this until we can do a detailed review for security. > Can not access user logs - Jetty is not configured by default to serve > aliases/symlinks > --------------------------------------------------------------------------------------- > > Key: MAPREDUCE-4572 > URL: https://issues.apache.org/jira/browse/MAPREDUCE-4572 > Project: Hadoop Map/Reduce > Issue Type: Bug > Components: tasktracker, webapps > Affects Versions: 1.0.0 > Reporter: Ahmed Radwan > Assignee: Ahmed Radwan > Fix For: 1.2.0, 2.2.0-alpha > > Attachments: MAPREDUCE-4572.patch, MAPREDUCE-4572_trunk.patch > > > The task log servlet can no longer access user logs because MAPREDUCE-2415 > introduce symlinks to the logs and jetty is not configured by default to > serve symlinks. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira