Uploaded image for project: 'Ambari'
  1. Ambari
  2. AMBARI-12227

Kerberos Wizard: temporarily stores admin principal / password in browser's local storage

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Critical
    • Resolution: Fixed
    • 2.0.0
    • 2.1.1
    • ambari-web
    • None

    Description

      Kerberos admin credentials are stored in the browser's local storage in plain text during Enable Kerberos Wizard. This is blown away when the user exits the wizard or on log out.
      However, if there is a chance for an attacker without proper Ambari credentials to look at the Kerberos credentials. For example, the admin can launch Enable Kerberos Wizard and enters Kerberos admin credentials on the 2nd page, and goes forward. At this point, Kerberos admin crendentials are stored in browser's local storage. If the user walks away from his desk, the other user can look in the browser developer tools to find the Kerberos admin principal and password.

      Attachments

        1. AMBARI-12227.patch
          5 kB
          Richard Zang

        Issue Links

          Activity

            People

              rzang Richard Zang
              rzang Richard Zang
              Votes:
              1 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: