Details
-
Bug
-
Status: Open
-
Major
-
Resolution: Unresolved
-
0.8.1
-
Linux
-
Patch, Important
Description
Without user impersonification (which is impossible with %spark anyway), a user can just write a simple script to see any file in the Zeppelin folder, including shiro.ini or any notes. So, the users and passwords in shiro become pretty meaningless. Can't zeppelin just disallow such peeking?
For example, any user can just execute the following in a note to get what is inside the shiro.ini file.
import scala.sys.process._ "cat conf/shiro.ini".!!
I know that one can use livy.spark instead for proper user impersonification, but then you can't use ZeppelinContext variable z.
Attachments
Issue Links
- blocks
-
ZEPPELIN-4317 Release version 0.8.2
- Resolved
- relates to
-
ZEPPELIN-4053 Implement impersonation via c native api
- Open