Details
-
Bug
-
Status: Resolved
-
Critical
-
Resolution: Fixed
-
2.0.0
-
None
Description
Kerberos admin credentials are stored in the browser's local storage in plain text during Enable Kerberos Wizard. This is blown away when the user exits the wizard or on log out.
However, if there is a chance for an attacker without proper Ambari credentials to look at the Kerberos credentials. For example, the admin can launch Enable Kerberos Wizard and enters Kerberos admin credentials on the 2nd page, and goes forward. At this point, Kerberos admin crendentials are stored in browser's local storage. If the user walks away from his desk, the other user can look in the browser developer tools to find the Kerberos admin principal and password.
Attachments
Attachments
Issue Links
- links to