You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Julia (JIRA)" <ji...@apache.org> on 2018/08/08 01:42:00 UTC
[jira] [Created] (AMBARI-24419) XSS attack in Ambari Config History
Julia created AMBARI-24419:
------------------------------
Summary: XSS attack in Ambari Config History
Key: AMBARI-24419
URL: https://issues.apache.org/jira/browse/AMBARI-24419
Project: Ambari
Issue Type: Bug
Components: ambari-client
Affects Versions: 2.7.1
Reporter: Julia
It is possible for an attacker to steal information or access from users by executing malicious JavaScript. This is possible due to the use of a javascript "eval()" function when loading the notes from config history change. Leveraging this one user could create a malicious history entry to steal access or information of another user. Upon viewing the malicious historical entry the victim would be comprimised by directly scraping any information on the page, modify its appearance, or having their session information stolen.
!https://msdata.visualstudio.com/0cd33d4d-ce7c-416d-ab00-26e15edb66e6/_apis/wit/attachments/81b481b3-397c-442e-b0aa-199ff793a05d?fileName=attachfilehandler%20%283%29.png!
fg
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)