Uploaded image for project: 'IMPALA'
  1. IMPALA
  2. IMPALA-1133

Ensure all webserver output is escaped

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • Impala 1.3.1
    • Impala 2.0
    • None
    • None
    • 1 name node 3 datanodes

    Description

      I just recieved this issue from our Nessus application

      Synopsis :

      The remote web server is prone to a cookie injection attack.

      Description :

      The remote host is running a web server that fails to adequately
      sanitize request strings of malicious JavaScript. By leveraging this
      issue, an attacker may be able to inject arbitrary cookies. Depending
      on the structure of the web application, it may be possible to launch
      a 'session fixation' attack using this mechanism.

      Attachments

        Activity

          People

            henryr Henry Robinson
            drinknderive_impala_43ea charles
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: