-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kbn-version header might become stale #14481
Comments
jalvz
added a commit
to jalvz/beats
that referenced
this issue
Nov 12, 2019
Non-browser clients are expected to use only kbn-xsrf for CSRF protection, and not kbn-version. kbn-version is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection. See elastic/kibana@621bf0e Fixes elastic#14481
jalvz
added a commit
that referenced
this issue
Nov 13, 2019
Non-browser clients are expected to use only kbn-xsrf for CSRF protection, and not kbn-version. kbn-version is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection. See elastic/kibana@621bf0e Fixes #14481
jalvz
added a commit
to jalvz/beats
that referenced
this issue
Nov 13, 2019
Non-browser clients are expected to use only kbn-xsrf for CSRF protection, and not kbn-version. kbn-version is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection. See elastic/kibana@621bf0e Fixes elastic#14481
jalvz
added a commit
to jalvz/beats
that referenced
this issue
Nov 13, 2019
Non-browser clients are expected to use only kbn-xsrf for CSRF protection, and not kbn-version. kbn-version is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection. See elastic/kibana@621bf0e Fixes elastic#14481
jalvz
added a commit
that referenced
this issue
Nov 13, 2019
Non-browser clients are expected to use only kbn-xsrf for CSRF protection, and not kbn-version. kbn-version is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection. See elastic/kibana@621bf0e Fixes #14481
jalvz
added a commit
that referenced
this issue
Nov 19, 2019
Non-browser clients are expected to use only kbn-xsrf for CSRF protection, and not kbn-version. kbn-version is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection. See elastic/kibana@621bf0e Fixes #14481
leweafan
pushed a commit
to leweafan/beats
that referenced
this issue
Apr 28, 2023
…lastic#14494) Non-browser clients are expected to use only kbn-xsrf for CSRF protection, and not kbn-version. kbn-version is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection. See elastic/kibana@621bf0e Fixes elastic#14481
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I believe that right now this is only an issue in apm-server, but non-browser clients are expected to use only
kbn-xsrf
for CSRF protection, and notkbn-version
.kbn-version
is problematic when Kibana is upgraded, since the version is only pinned at startup when libbeat establishes the connection.See elastic/kibana@621bf0e
The text was updated successfully, but these errors were encountered: