You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ambari.apache.org by wu...@apache.org on 2022/11/14 16:40:31 UTC
[ambari] branch trunk updated: AMBARI-25396: cross-site scripting vulnerability on Ambari hosts (#3500)
This is an automated email from the ASF dual-hosted git repository.
wuzhiguo pushed a commit to branch trunk
in repository https://gitbox.apache.org/repos/asf/ambari.git
The following commit(s) were added to refs/heads/trunk by this push:
new e54256d10b AMBARI-25396: cross-site scripting vulnerability on Ambari hosts (#3500)
e54256d10b is described below
commit e54256d10b9e92aa4a8024c77df5fd70068ab253
Author: Zhiguo Wu <wu...@apache.org>
AuthorDate: Tue Nov 15 00:40:25 2022 +0800
AMBARI-25396: cross-site scripting vulnerability on Ambari hosts (#3500)
---
ambari-web/app/views/wizard/step2_view.js | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/ambari-web/app/views/wizard/step2_view.js b/ambari-web/app/views/wizard/step2_view.js
index 6bbda30625..972c2c9b3c 100644
--- a/ambari-web/app/views/wizard/step2_view.js
+++ b/ambari-web/app/views/wizard/step2_view.js
@@ -39,8 +39,8 @@ App.SshKeyFileUploader = Em.View.extend({
return function (e) {
var fileNameArray = $("#file").val().toString().split("\\");
var selectedFileName = fileNameArray[fileNameArray.length -1];
- $('#selectedFileName').html(selectedFileName);
- $('#sshKey').html(e.target.result);
+ $('#selectedFileName').text(selectedFileName);
+ $('#sshKey').text(e.target.result);
self.get("controller").setSshKey(e.target.result);
};
})(file);
---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@ambari.apache.org
For additional commands, e-mail: commits-help@ambari.apache.org