Details
-
Bug
-
Status: Closed
-
Critical
-
Resolution: Fixed
-
1.6.0, 1.7.0, 1.8.0, 1.9.0, 1.10.0, 1.11.0
-
Apache drill installed in debian system
Description
Hello Apache security team,
I have been testing an application which internally uses the Apache drill software v 1.6 as of now.
I found XSS on profile page (sink) where in the user's malicious input comes from the Query page (source) where you run a query.
Affected URL : https://localhost:8047/profiles
Once the user give the below payload and load the profile page, it gets triggered and is stored.
I have attached the screenshot of payload <script>alert(document.cookie)</script>.
*[screenshot link]
*
https://drive.google.com/file/d/0B8giJ3591fvUbm5JZWtjUTg3WmEwYmJQeWd6dURuV0gzOVd3/view?usp=sharing
https://drive.google.com/file/d/0B8giJ3591fvUV2lJRzZWOWRGNzN5S0JzdVlXSG1iNnVwRlAw/view?usp=sharing