Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Jwt Token Invalidated at logout so that some endpoints cannot be accessed with previous jwt token #21998

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

sug-ghosh
Copy link

Description

When a user logged off from the UI, a malicious user can send request with the existing cookie of the user. The admin UI still authenticate as a valid user.

Mainly in endpoint, http://trino-host:8080/ui/api/query , http://trino-host:8080/ui/api/cluster , http://trino-host:8080/ui/api/stats the malicious user can see the query details.
Even thought jwt Token is bind with Cookie and the the token Expiry time can be set as short-lived token. Still if an user logged off before that, it still an issue as malicious user can see the query details by hitting http://trino-host:8080/ui/api/query .

Fixes #21783

Additional context and related issues

Release notes

( ) This is not user-visible or is docs only, and no release notes are required.
( ) Release notes are required. Please propose a release note for me.
( ) Release notes are required, with the following suggested text:

# Section
* Fix some things. ({issue}`issuenumber`)

@cla-bot cla-bot bot added the cla-signed label May 16, 2024
@sug-ghosh
Copy link
Author

cc @dain @lukasz-walkiewicz

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

Admin UI can be accessed with the Authorization Bearer Jwt Token even after Logoff
1 participant