Re: Flume HTTP source and CSRF vulnerability

2016-01-16 Thread Roshan Naik
Thanks! On 1/16/16, 8:51 AM, "Ashish" wrote: >IMHO, No. XSRF can happen with session based things where two parties >are talking. >In Flume's case we never talk, we just listen and pass on the data. >Other than Http Ok, we send anything back. >We don't provide "Identifier" to the client which c

Re: Flume HTTP source and CSRF vulnerability

2016-01-16 Thread Ashish
IMHO, No. XSRF can happen with session based things where two parties are talking. In Flume's case we never talk, we just listen and pass on the data. Other than Http Ok, we send anything back. We don't provide "Identifier" to the client which can be used by anyone else. You must have encountered

Re: Flume HTTP source and CSRF vulnerability

2016-01-09 Thread Gonzalo Herreros
Hi Roshan, I haven't seen nor I'm aware of any protection like that but I don't think is required either. Flume http source doesn't enable CORS nor hosts any html, so that kind of attack is prevented by the browser. In general, I think is strange having a browser connected to Flume other than for

Flume HTTP source and CSRF vulnerability

2016-01-08 Thread Roshan Naik
My understanding is that Flume HTTP source does not have any protection against Cross-Site Request Forgery (CSRF) attacks. Wanted to double check with others if that is correct ? -roshan