[jira] [Resolved] (ACCUMULO-3460) Monitor should not allow HTTP TRACE

2015-05-26 Thread Christopher Tubbs (JIRA)

 [ 
https://issues.apache.org/jira/browse/ACCUMULO-3460?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christopher Tubbs resolved ACCUMULO-3460.
-
   Resolution: Fixed
Fix Version/s: 1.7.1
   1.8.0
   1.6.3

Okay, [~busbey], this should be fixed now.

 Monitor should not allow HTTP TRACE
 ---

 Key: ACCUMULO-3460
 URL: https://issues.apache.org/jira/browse/ACCUMULO-3460
 Project: Accumulo
  Issue Type: Bug
  Components: monitor
Affects Versions: 1.5.0, 1.5.1, 1.5.2, 1.6.0
Reporter: Sean Busbey
Assignee: Christopher Tubbs
Priority: Minor
  Labels: security
 Fix For: 1.6.3, 1.8.0, 1.7.1

  Time Spent: 0.5h
  Remaining Estimate: 0h

 A Nessus scan pinged my test cluster because the Accumulo monitor allows HTTP 
 TRACE requests. (ref: [an overview of the general problem 
 class|http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf])
 The issue isn't bad unless
 * there's a same-origin-policy bypass for the user browser
 * there's an auth token we care about
 Exploits the bypass the same-origin-policy happen, so it's best to clean up 
 server side if possible.
 The only auth tokens present in the Monitor are when we make use of the 
 ShellServlet from ACCUMULO-196. We rely on the session state for auth, so 
 there isn't a risk of leaking auth info directly, but we would leak the 
 session id. 
 The CSRF added in ACCUMULO-2785 means just the session id wouldn't be enough 
 for impersonation, but if an attacker can read one requested page we have to 
 presume they can read another.
 We should clean up our configs to disallow HTTP TRACE as a proactive measure.
 Marking minor since an attack vector would need an enabling vulnerability on 
 the client side.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (ACCUMULO-3460) Monitor should not allow HTTP TRACE

2015-05-22 Thread Christopher Tubbs (JIRA)

 [ 
https://issues.apache.org/jira/browse/ACCUMULO-3460?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Christopher Tubbs resolved ACCUMULO-3460.
-
   Resolution: Not A Problem
Fix Version/s: (was: 1.7.1)
   (was: 1.8.0)
   (was: 1.6.3)
 Assignee: Christopher Tubbs

It looks like this isn't a problem as of 1.6.1. Switching to Jetty 8 and 9 in 
ACCUMULO-2934 and ACCUMULO-2808, respectively, fixed the issue. Jetty 8 and 
later disable TRACE by default.

 Monitor should not allow HTTP TRACE
 ---

 Key: ACCUMULO-3460
 URL: https://issues.apache.org/jira/browse/ACCUMULO-3460
 Project: Accumulo
  Issue Type: Bug
  Components: monitor
Affects Versions: 1.5.0, 1.5.1, 1.5.2, 1.6.0
Reporter: Sean Busbey
Assignee: Christopher Tubbs
Priority: Minor
  Labels: security

 A Nessus scan pinged my test cluster because the Accumulo monitor allows HTTP 
 TRACE requests. (ref: [an overview of the general problem 
 class|http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf])
 The issue isn't bad unless
 * there's a same-origin-policy bypass for the user browser
 * there's an auth token we care about
 Exploits the bypass the same-origin-policy happen, so it's best to clean up 
 server side if possible.
 The only auth tokens present in the Monitor are when we make use of the 
 ShellServlet from ACCUMULO-196. We rely on the session state for auth, so 
 there isn't a risk of leaking auth info directly, but we would leak the 
 session id. 
 The CSRF added in ACCUMULO-2785 means just the session id wouldn't be enough 
 for impersonation, but if an attacker can read one requested page we have to 
 presume they can read another.
 We should clean up our configs to disallow HTTP TRACE as a proactive measure.
 Marking minor since an attack vector would need an enabling vulnerability on 
 the client side.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)