Details
-
Bug
-
Status: Resolved
-
Major
-
Resolution: Fixed
-
2.7.3
Description
Ambari's UI evaluates Javascript blocks embedded in user input when adding hosts, adding remote clusters, and renaming the cluster.
The script evaluation appears to occur before the data is submitted and saved to the Ambari database (if save at all). Therefore, no XSS vulnerability needs to be reported since the scope of the threat is only to the interactive user at the instance the data is evaluated.
Add remote cluster steps to reproduce:
- Log into ambari and navigate to admin > Manage Ambari> Cluster Management> Remote Cluster > Register Remote Cluster
- Enter malicious script in Ambari Cluster URL textbox and click on save. The output of XSS is reflected.
Add hosts steps to reproduce:
- Log into ambari and navigate to Hosts> Actions> Add New Hosts
- Enter malicious script in Target Hosts textbox and click on save. The output of XSS is reflected
Edit cluster name steps to reproduce:
- Log into ambari and navigate to admin > Manage Ambari> Cluster Management> Cluster Information
- Enter malicious script in Cluster Name textbox. The output of XSS is reflected
Attachments
Issue Links
- links to