Uploaded image for project: 'HBase'
  1. HBase
  2. HBASE-16267

Remove commons-httpclient dependency from hbase-rest module

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Critical
    • Resolution: Fixed
    • None
    • 2.0.0
    • None
    • None
    • Reviewed
    • Hide
      This issue upgrades httpclient to 4.5.2 and httpcore to 4.4.4 which are the versions used by hadoop-2.
      This is to handle the following CVE's.

      https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 : http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.

      https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153
      https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783
      Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

      Downstream users who are exposed to commons-httpclient via the HBase classpath will have to similarly update their dependency.
      Show
      This issue upgrades httpclient to 4.5.2 and httpcore to 4.4.4 which are the versions used by hadoop-2. This is to handle the following CVE's. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 : http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783 Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. Downstream users who are exposed to commons-httpclient via the HBase classpath will have to similarly update their dependency.

    Description

      hbase-rest module still has imports from org.apache.commons.httpclient .

      There is more work to be done after HBASE-15767 was integrated.

      In master branch, there seems to be transitive dependency which allows the code to compile:

      [INFO] +- org.apache.hadoop:hadoop-common:jar:2.7.1:compile
      [INFO] |  +- org.apache.hadoop:hadoop-annotations:jar:2.7.1:compile
      [INFO] |  +- commons-cli:commons-cli:jar:1.2:compile
      [INFO] |  +- org.apache.commons:commons-math3:jar:3.1.1:compile
      [INFO] |  +- xmlenc:xmlenc:jar:0.52:compile
      [INFO] |  +- commons-httpclient:commons-httpclient:jar:3.1:compile
      

      HADOOP-12767
      to move the uses of httpclient HADOOP-10105

      https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 : http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.

      https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153
      https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783
      Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

      Attachments

        1. 16267.v9.txt
          30 kB
          Ted Yu
        2. 16267.v8.txt
          30 kB
          Ted Yu
        3. 16267.v6.txt
          28 kB
          Ted Yu
        4. 16267.v4.txt
          28 kB
          Ted Yu
        5. 16267.v2.txt
          24 kB
          Ted Yu
        6. 16267.v15.txt
          30 kB
          Ted Yu
        7. 16267.v15.txt
          30 kB
          Michael Stack
        8. 16267.v14.txt
          29 kB
          Ted Yu
        9. 16267.v13.txt
          30 kB
          Ted Yu
        10. 16267.v12.txt
          30 kB
          Ted Yu
        11. 16267.v11.txt
          30 kB
          Ted Yu
        12. 16267.v10.txt
          29 kB
          Ted Yu

        Activity

          People

            yuzhihong@gmail.com Ted Yu
            yuzhihong@gmail.com Ted Yu
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: