[jira] [Resolved] (ACCUMULO-3460) Monitor should not allow HTTP TRACE

2015-05-26 Thread Christopher Tubbs (JIRA)

 [ 
https://issues.apache.org/jira/browse/ACCUMULO-3460?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christopher Tubbs resolved ACCUMULO-3460.
-
   Resolution: Fixed
Fix Version/s: 1.7.1
   1.8.0
   1.6.3

Okay, [~busbey], this should be fixed now.

> Monitor should not allow HTTP TRACE
> ---
>
> Key: ACCUMULO-3460
> URL: https://issues.apache.org/jira/browse/ACCUMULO-3460
> Project: Accumulo
>  Issue Type: Bug
>  Components: monitor
>Affects Versions: 1.5.0, 1.5.1, 1.5.2, 1.6.0
>Reporter: Sean Busbey
>Assignee: Christopher Tubbs
>Priority: Minor
>  Labels: security
> Fix For: 1.6.3, 1.8.0, 1.7.1
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> A Nessus scan pinged my test cluster because the Accumulo monitor allows HTTP 
> TRACE requests. (ref: [an overview of the general problem 
> class|http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf])
> The issue isn't bad unless
> * there's a same-origin-policy bypass for the user browser
> * there's an auth token we care about
> Exploits the bypass the same-origin-policy happen, so it's best to clean up 
> server side if possible.
> The only auth tokens present in the Monitor are when we make use of the 
> ShellServlet from ACCUMULO-196. We rely on the session state for auth, so 
> there isn't a risk of leaking auth info directly, but we would leak the 
> session id. 
> The CSRF added in ACCUMULO-2785 means just the session id wouldn't be enough 
> for impersonation, but if an attacker can read one requested page we have to 
> presume they can read another.
> We should clean up our configs to disallow HTTP TRACE as a proactive measure.
> Marking minor since an attack vector would need an enabling vulnerability on 
> the client side.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (ACCUMULO-3460) Monitor should not allow HTTP TRACE

2015-05-22 Thread Christopher Tubbs (JIRA)

 [ 
https://issues.apache.org/jira/browse/ACCUMULO-3460?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christopher Tubbs resolved ACCUMULO-3460.
-
   Resolution: Not A Problem
Fix Version/s: (was: 1.7.1)
   (was: 1.8.0)
   (was: 1.6.3)
 Assignee: Christopher Tubbs

It looks like this isn't a problem as of 1.6.1. Switching to Jetty 8 and 9 in 
ACCUMULO-2934 and ACCUMULO-2808, respectively, fixed the issue. Jetty 8 and 
later disable TRACE by default.

> Monitor should not allow HTTP TRACE
> ---
>
> Key: ACCUMULO-3460
> URL: https://issues.apache.org/jira/browse/ACCUMULO-3460
> Project: Accumulo
>  Issue Type: Bug
>  Components: monitor
>Affects Versions: 1.5.0, 1.5.1, 1.5.2, 1.6.0
>Reporter: Sean Busbey
>Assignee: Christopher Tubbs
>Priority: Minor
>  Labels: security
>
> A Nessus scan pinged my test cluster because the Accumulo monitor allows HTTP 
> TRACE requests. (ref: [an overview of the general problem 
> class|http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf])
> The issue isn't bad unless
> * there's a same-origin-policy bypass for the user browser
> * there's an auth token we care about
> Exploits the bypass the same-origin-policy happen, so it's best to clean up 
> server side if possible.
> The only auth tokens present in the Monitor are when we make use of the 
> ShellServlet from ACCUMULO-196. We rely on the session state for auth, so 
> there isn't a risk of leaking auth info directly, but we would leak the 
> session id. 
> The CSRF added in ACCUMULO-2785 means just the session id wouldn't be enough 
> for impersonation, but if an attacker can read one requested page we have to 
> presume they can read another.
> We should clean up our configs to disallow HTTP TRACE as a proactive measure.
> Marking minor since an attack vector would need an enabling vulnerability on 
> the client side.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)