Missing cookie security headers

Description

Observation
We found that the cookies set by the web application are not configured securely.
The Hadoop uses the “bcookie” and DEFAULT_UI cookies. All Hadoop-related hosts and ports are affected.
The CDAP instances and the CDAP_Auth_Token also affected.

Risk
With a successful MITM attack or cross-site scripting vulnerability the attacker can obtain the value of the affected cookies.
The secure flag disallows the transmission of the cookie through a non-secure (non-HTTPS) channel, making sure that it cannot be stolen and the session cannot be hijacked.
The httpOnly flag notifies the browser that the given cookie cannot be used by client-side scripting, thus giving some protection in case of cross-site scripting (XSS) vulnerabilities.

Release Notes

None

Activity

Show:

Nick Briggs November 10, 2021 at 12:21 AM
Edited

See

Venkatachalapati Rao Jasti September 29, 2021 at 7:30 PM

keen to know, if this issue ever going to be part of any future fix. We are using CDAP 6.3. Thank You in advance,

Venkatachalapati Rao Jasti August 25, 2021 at 12:20 PM

request for an update, if this issue fix planned in any of the upcoming release. We are using CDAP 6.3.

Venkatachalapati Rao Jasti July 21, 2021 at 5:11 AM

, kindly suggest, if any roadmap to cover this issue in the upcoming CDAP releases (post 6.3).

Pinned fields
Click on the next to a field label to start pinning.

Details

Assignee

Reporter

Affects versions

Components

Priority

Created May 31, 2021 at 2:45 PM
Updated November 10, 2021 at 12:22 AM