Thanks for reporting this issue.
It is already discussed on Flink's dev mailing list in this thread:

->
https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E

Please continue the discussion there.

Thanks, Fabian

Am Di., 13. Aug. 2019 um 13:33 Uhr schrieb V N, Suchithra (Nokia -
IN/Bangalore) <suchithra....@nokia.com>:

> Hello,
>
>
>
> We are using Apache Flink 1.7.2 version. During our security scans
> following issues are reported by our scan tool. Please let us know your
> comments on these issues.
>
>
>
> *[1] 150085 Slow HTTP POST vulnerability*
>
> *Severity *Potential Vulnerability - Level 3
>
> *Group *Information Disclosure
>
>
>
> *Threat*
>
> The web application is possibly vulnerable to a "slow HTTP POST" Denial of
> Service (DoS) attack. This is an application-level DoS that consumes server
>
> resources by maintaining open connections for an extended period of time
> by slowly sending traffic to the server. If the server maintains too many
> connections
>
> open at once, then it may not be able to respond to new, legitimate
> connections.
>
>
>
> *#1 Request*
>
> *Payload *N/A
>
> *Request *POST https://<ip>:<port>/
>
> #1 Host: <ip>:<port>
>
> #3 Accept: */*
>
> #4 Content-Type: application/x-www-form-urlencoded
>
>
>
> *#1 Response*
>
> Vulnerable to slow HTTP POST attack
>
> Connection with partial POST body remained open for: 312932 milliseconds
>
>
>
> *[2] 150124 Clickjacking - Framable Page (10)*
>
> *Severity *Confirmed Vulnerability - Level 3
>
> *Group *Information Disclosure
>
> *CVSS Base *6.4 *CVSS Temporal*5.8
>
>
>
> *Threat*
>
> The web page can be framed. This means that clickjacking attacks against
> users are possible.
>
>
>
> *#1 Request*
>
> *Payload *N/A
>
> *Request *GET https://<ip>:<port>/
>
> #1 Host: <ip>:<port>
>
> #3 Accept: */*
>
>
>
> *#1 Response*
>
> The URI was framed.
>
>
>
> Below url’s have also reported the same issues and response was same.
>
>
>
> *Request *GET https://<ip>:<port>/partials/jobs/running-jobs.html
>
> *Request *GET https://<ip>:<port>/partials/submit.html
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/stdout.html
>
> *Request *GET https://<ip>:<port>/partials/jobs/completed-jobs.html
>
> *Request *GET https://<ip>:<port>/partials/taskmanager/index.html
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/log.html
> <https://10.75.119.114:32007/partials/jobmanager/log.html>
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/index.html
>
> *Request *GET https://<ip.:<port>/partials/overview.html
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/config.html
>
>
>
> *[3] 150162 Use of JavaScript Library with Known Vulnerability (4)*
>
>
>
> *Threat*
>
> The web application is using a JavaScript library that is known to contain
> at least one vulnerability.
>
>
>
> *#1 Request*
>
> *Payload *-
>
> *Request *GET https://<ip>:<port>/
>
> #1 Host: <ip>:<port>
>
> #3 Accept: */*
>
>
>
> *#1 Response*
>
> *Vulnerable javascript library: jQuery*
>
> *version: 2.2.0*
>
> Details:
>
> CVE-2015-9251: jQuery versions on or above 1.4.0 and below 1.12.0 (version
> 1.12.3 and above but below 3.0.0-beta1 as well) are vulnerable to XSS via
> 3rd party text/javascript responses(3rd party
>
> CORS request may execute). (https://github.com/jquery/jquery/issues/2432).
>
> Solution: jQuery version 3.0.0 has been released to address the issue (
> http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/). Please
> refer to vendor documentation (https://blog.jquery.com/)
>
> for the latest security updates.
>
>
>
> Found on the following pages (only first 10 pages are reported):
>
> https://<ip>:<port>/
>
> https://<ip>:<port>/#/completed-jobs
>
> https://<ip>:<port>/#/jobmanager/config
>
> https://<ip>:<port>/#/overview
>
> https://<ip>:<port>/#/running-jobs
>
> https://<ip>:<port>/#/submit
>
> https://<ip>:<port>/#/taskmanagers
>
> https://<ip>:<port>/#/jobmanager/log
>
> https://<ip>:<port>/#/jobmanager/stdout
>
> https://<ip>:<port>/#/taskmanager/100474b27dcd8eeb9f3ff38c952977c9/log
>
>
>
>
>
> *#1 Response*
>
> *Vulnerable javascript library: Angular*
>
> *version: 1.4.8*
>
> Details:
>
> In angular versions below 1.6.5 both Firefox and Safari are vulnerable to
> XSS in $sanitize if an inert document created via
> `document.implementation.createHTMLDocument()` is used. Angular version
>
> 1.6.5 checks for these vulnerabilities and then use a DOMParser or XHR
> strategy if needed. Please refer to vendor documentation (
> https://github.com/angular/angular.js/commit/
>
> 8f31f1ff43b673a24f84422d5c13d6312b2c4d94) for latest security updates.
>
> Found on the following pages (only first 10 pages are reported):
>
> https://<ip>:<port>/
>
> https://<ip>:<port>/#/completed-jobs
>
> https://<ip>:<port>/#/jobmanager/config
>
> https://<ip>:<port>/#/overview
>
> https://<ip>:<port>/#/running-jobs
>
> https://<ip>:<port>/#/submit
>
> https://<ip>:<port>/#/taskmanagers
>
> https://<ip>:<port>/#/jobmanager/log
>
> https://<ip>:<port>/#/jobmanager/stdout
>
> https://<ip>:<port>/#/taskmanager/100474b27dcd8eeb9f3ff38c952977c9/log
> <https://10.75.119.114:32007/#/taskmanager/100474b27dcd8eeb9f3ff38c952977c9/log>
>
>
>
> *#1 Response*
>
> *Vulnerable javascript library: Bootstrap*
>
> *version: 3.3.6*
>
> Details:
>
> The data-target attribute in bootstrap versions below 3.4.0 is vulnerable
> to Cross-Site Scripting(XSS) attacks. Please refer to vendor documentation (
> https://github.com/twbs/bootstrap/pull/23687, https://
>
> github.com/twbs/bootstrap/issues/20184) for the latest security updates.
>
> ----------------------------------------------
>
> CVE-2019-8331: In bootstrap versions before 3.4.1, data-template,
> data-content and data-title properties of tooltip or popover are vulnerable
> to Cross-Site Scripting(XSS) attacks. Please refer to vendor
>
> documentation (https://github.com/twbs/bootstrap/issues/28236) for latest
> security updates.
>
> Found on the following pages (only first 10 pages are reported):
>
> https://<ip>:<port>/
>
> https://<ip>:<port>/#/completed-jobs
>
> https://<ip>:<port>/#/jobmanager/config
>
> https://<ip>:<port>/#/overview
>
> https://<ip>:<port>/#/running-jobs
>
> https://<ip>:<port>/#/submit
>
> https://<ip>:<port>/#/taskmanagers
>
> https://<ip>:<port>/#/jobmanager/log
>
> https://<ip>:<port>/#/jobmanager/stdout
>
> https://<ip>:<port>/#/taskmanager/100474b27dcd8eeb9f3ff38c952977c9/log
> <https://10.75.119.114:32007/#/taskmanager/100474b27dcd8eeb9f3ff38c952977c9/log>
>
>
>
> *Vulnerable javascript library: moment*
>
> *version: 2.10.6*
>
> Details:
>
> CVE-2016-4055: moment versions below 2.11.2 are vulnerable to regular
> expression denial of service when user input is passed unchecked into
> moment.duration() blocking the event loop for a period
>
> of time.(https://github.com/moment/moment/issues/2936).
>
> Solution: moment version 2.11.2 has been released to address the issue.
> Please refer to vendor documentation (
> https://github.com/moment/moment/blob/develop/CHANGELOG.md,
> https://nvd.nist.gov/
>
> vuln/detail/CVE-2016-4055 ) for latest security updates.
>
> Found on the following pages (only first 10 pages are reported):
>
> https://<ip>:<port>/
>
> https://<ip>:<port>/#/completed-jobs
>
> https://<ip>:<port>/#/jobmanager/config
>
> https://<ip>:<port>/#/overview
>
> https://<ip>:<port>/#/running-jobs
>
> https://<ip>:<port>/#/submit
>
> https://<ip>:<port>/#/taskmanagers
>
> https://<ip>:<port>/#/jobmanager/log
>
> https://<ip>:<port>/#/jobmanager/stdout
>
> https://<ip>:<port>/#/taskmanager/100474b27dcd8eeb9f3ff38c952977c9/log
>
>
>
>
>
> *[4] 150081 X-Frame-Options header is not set **(10)*
>
> *Severity *Potential Vulnerability - Level 1
>
> *Group *Information Disclosure
>
> *CVSS Base *5 *CVSS Temporal*4.1
>
>
>
> *Threat*
>
> The X-Frame-Options header is not set in the HTTP response, which may lead
> to a possible framing of the page. An attacker can trick users into
> clicking on a
>
> malicious link by framing the original page and showing a layer on top of
> it with legitimate-looking buttons.
>
>
>
> *#1 Request*
>
> *Payload *N/A
>
> *Request *GET https://<ip>:<port>/
>
> #1 Host: <ip>:<port>
>
> #3 Accept: */*
>
>
>
> *#1 Response*
>
> The response for this request either did not have an "X-FRAME-OPTIONS"
> header present or was not set to DENY or SAMEORIGIN
>
>
>
> *Request *GET https://<ip>:<port>/partials/jobs/running-jobs.html
> <https://10.75.119.114:32007/partials/jobs/running-jobs.html>
>
> *Request *GET https://<ip>:<port>/partials/submit.html
> <https://10.75.119.114:32007/partials/submit.html>
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/stdout.html
> <https://10.75.119.114:32007/partials/jobmanager/stdout.html>
>
> *Request *GET https://<ip>:<port>/partials/jobs/completed-jobs.html
> <https://10.75.119.114:32007/partials/jobs/completed-jobs.html>
>
> *Request *GET https://<ip>:<port>/partials/taskmanager/index.html
> <https://10.75.119.114:32007/partials/taskmanager/index.html>
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/log.html
> <https://10.75.119.114:32007/partials/jobmanager/log.html>
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/index.html
> <https://10.75.119.114:32007/partials/jobmanager/index.html>
>
> *Request *GET https://<ip>:<port>/partials/overview.html
> <https://10.75.119.114:32007/partials/overview.html>
>
> *Request *GET https://<ip>:<port>/partials/jobmanager/config.html
> <https://10.75.119.114:32007/partials/jobmanager/config.html>
>
>
>
>
>
> *[5] 150202 Missing header: X-Content-Type-Options*
>
> *Severity *Information Gathered - Level 2
>
> *Group *Information Gathered
>
>
>
> *Threat*
>
> The X-Content-Type-Options response header is not present. WAS reports
> missing X-Content-Type-Options header on each crawled link with all types
> of static
>
> and dynamic response. The scanner performs the check on 4xx and 5xx
> responses too. It's possible to see a directory link reported for QID as
> well.
>
>
>
> X-Content-Type-Options: Header missing
>
> Response headers on link: GET https://<ip>:<port>/ response code: 200
>
> Content-Type: text/html
>
> Date: Fri, 05 Jul 2019 01:22:22 GMT
>
> Expires: Fri, 05 Jul 2019 01:27:22 GMT
>
> Cache-Control: private, max-age=300
>
> Last-Modified: Mon, 01 Jul 2019 09:45:33 GMT
>
> Connection: keep-alive
>
> Content-Length: 3306
>
> Header missing on the following link(s):
>
> (Only first 50 such pages are listed)
>
> GET https://<ip>:<port>/ response code: 200
>
> GET https://<ip>:<port>/images/safari-pinned-tab.svg response code: 200
>
> GET https://<ip>:<port>/js/index.js response code: 200
>
> GET https://<ip>:<port>/images/favicon-32x32.png response code: 200
>
> GET https://<ip>:<port>/images/apple-touch-icon.png response code: 200
>
> GET https://<ip>:<port>/images/favicon.ico response code: 200
>
> GET https://<ip>:<port>/js/vendor.js response code: 200
>
> GET https://<ip>:<port>/css/vendor.css response code: 200
>
> GET https://<ip>:<port>/css/index.css response code: 200
>
> GET https://<ip>:<port>/images/favicon-16x16.png response code: 200
>
> GET https://<ip>:<port>/images/manifest.json response code: 200
>
> GET https://<ip>:<port>/config response code: 200
>
> GET https://<ip>:<port>/fonts/fontawesome-webfont.ttf?v=4.5.0 response
> code: 200
>
> GET https://<ip>:<port>/fonts/fontawesome-webfont.woff2?v=4.5.0 response
> code: 200
>
> GET https://<ip>:<port>/fonts/fontawesome-webfont.woff?v=4.5.0 response
> code: 200
>
> GET https://<ip>:<port>/jobs/overview response code: 200
>
> GET https://<ip>:<port>/overview response code: 200
>
> GET https://<ip>:<port>/partials/overview.html response code: 200
>
> GET https://<ip>:<port>/favicon.ico response code: 404
>
> GET https://<ip>:<port>/partials/jobs/completed-jobs.html response code:
> 200
>
> GET https://<ip>:<port>/jobmanager/config response code: 200
>
> GET https://<ip>:<port>/partials/jobmanager/config.html response code: 200
>
> GET https://<ip>:<port>/partials/jobmanager/index.html response code: 200
>
> GET https://<ip>:<port>/partials/jobs/running-jobs.html response code: 200
>
> GET https://<ip>:<port>/jars/ response code: 200
>
> GET https://<ip>:<port>/partials/submit.html response code: 200
>
> GET https://<ip>:<port>/partials/taskmanager/index.html response code: 200
>
> GET https://<ip>:<port>/taskmanagers response code: 200
>
> GET https://<ip>:<port>/jobmanager/log response code: 200
>
> GET https://<ip>:<port>/partials/jobmanager/log.html response code: 200
>
> GET https://<ip>:<port>/jobmanager/stdout response code: 200
>
> GET https://<ip>:<port>/partials/jobmanager/stdout.html response code: 200
>
> GET https://<ip>:<port>/partials/%257B%257B'%23/jobs/'%20+%20jid%7D%7D
> <https://%3cip%3e:%3cport%3e/partials/%257B%257B'%23/jobs/'%20+%20jid%7D%7D>
> response code: 404
>
> GET https://<ip>:<port>/partials/taskmanager/taskmanager.html response
> code: 200
>
> GET https://<ip>:<port>/partials/taskmanager/taskmanager.metrics.html
> response code: 200
>
> GET https://<ip>:<port>/taskmanagers/100474b27dcd8eeb9f3ff38c952977c9
> response code: 200
>
> GET https://<ip>:<port>/partials/jobmanager/jobmanager/log response code:
> 404
>
> GET https://<ip>:<port>/partials/jobmanager/jobmanager/stdout response
> code: 404
>
> GET https://<ip>:<port>/taskmanagers/100474b27dcd8eeb9f3ff38c952977c9/log
> response code: 500
>
> GET https://<ip>:<port>/partials/taskmanager/taskmanager.log.html
> response code: 200
>
> GET
> https://<ip>:<port>/taskmanagers/100474b27dcd8eeb9f3ff38c952977c9/stdout
> response code: 500
>
> GET https://<ip>:<port>/partials/taskmanager/taskmanager.stdout.html
> response code: 200
>
> GET
> https://<ip>:<port>/partials/taskmanager/taskmanagers/%7B%7Btaskmanagerid%7D%7D/log
> <https://%3cip%3e:%3cport%3e/partials/taskmanager/taskmanagers/%7B%7Btaskmanagerid%7D%7D/log>
> response code: 404
>
> GET
> https://<ip>:<port>/partials/taskmanager/taskmanagers/%257B%257Btaskmanagerid%257D%257D/log
> <https://%3cip%3e:%3cport%3e/partials/taskmanager/taskmanagers/%257B%257Btaskmanagerid%257D%257D/log>
> response code: 404
>
> GET
> https://<ip>:<port>/partials/taskmanager/taskmanagers/%7B%7Btaskmanagerid%7D%7D/stdout
> <https://%3cip%3e:%3cport%3e/partials/taskmanager/taskmanagers/%7B%7Btaskmanagerid%7D%7D/stdout>
> response code: 404
>
> GET
> https://<ip>:<port>/partials/taskmanager/taskmanagers/%257B%257Btaskmanagerid%257D%257D/stdout
> <https://%3cip%3e:%3cport%3e/partials/taskmanager/taskmanagers/%257B%257Btaskmanagerid%257D%257D/stdout>
> response code: 404
>
>
>
>
>
> *[6] 150204 Missing header: X-XSS-Protection*
>
> *Severity *Information Gathered - Level 1
>
> *Group *Information Gathered
>
>
>
> *Threat*
>
> The X-XSS-Protection response header is not present.
>
>
>
> X-Xss-Protection: Header missing
>
> Response headers on link: GET https://<ip>:<port>/ response code: 200
>
> Content-Type: text/html
>
> Date: Fri, 05 Jul 2019 01:22:22 GMT
>
> Expires: Fri, 05 Jul 2019 01:27:22 GMT
>
> Cache-Control: private, max-age=300
>
> Last-Modified: Mon, 01 Jul 2019 09:45:33 GMT
>
> Connection: keep-alive
>
> Content-Length: 3306
>
> Header missing on the following link(s):
>
> (Only first 50 such pages are listed)
>
> GET https://<ip>:<port>/ response code: 200
>
> GET https://<ip>:<port>/partials/overview.html response code: 200
>
> GET https://<ip>:<port>/partials/jobs/completed-jobs.html response code:
> 200
>
> GET https://<ip>:<port>/partials/jobmanager/config.html response code: 200
>
> GET https://<ip>:<port>/partials/jobmanager/index.html response code: 200
>
> GET https://<ip>:<port>/partials/jobs/running-jobs.html response code: 200
>
> GET https://<ip>:<port>/partials/submit.html response code: 200
>
> GET https://<ip>:<port>/partials/taskmanager/index.html response code: 200
>
> GET https://<ip>:<port>/jobmanager/log response code: 200
>
> GET https://<ip>:<port>/partials/jobmanager/log.html response code: 200
>
> GET https://<ip>:<port>/jobmanager/stdout response code: 200
>
>
>
>
>
> *[7] 150135 HTTP Strict Transport Security (HSTS) header
> missing/misconfigured.*
>
> *Severity *Information Gathered - Level 1
>
> *Group *Information Gathered
>
>
>
> *Threat*
>
> HTTP Strict Transport Security (HSTS) header found to be missing or
> misconfigured. HSTS header dictates to a conforming browser that the
> current and all
>
> subsequent connections (for a configurable amount of time) to the subject
> website should only be performed over a secure transport layer.
> Additionally, users are
>
> not permitted to bypass SSL/TLS certificate errors; preventing browser
> click-throughs in the event of expired or otherwise untrusted certificates.
>
>
>
> Strict Transport Security header missing for
>
> https://<ip>:<port>/
>
>
>
>
>
> Regards,
>
> Suchithra
>
>
>

Reply via email to