You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Aleksandr Kovalenko (JIRA)" <ji...@apache.org> on 2018/09/13 10:09:00 UTC

[jira] [Updated] (AMBARI-24628) Fix possible "Phishing by Navigating Browser Tabs" vulnerability

     [ https://issues.apache.org/jira/browse/AMBARI-24628?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Aleksandr Kovalenko updated AMBARI-24628:
-----------------------------------------
    Fix Version/s: 2.7.2

> Fix possible "Phishing by Navigating Browser Tabs" vulnerability
> ----------------------------------------------------------------
>
>                 Key: AMBARI-24628
>                 URL: https://issues.apache.org/jira/browse/AMBARI-24628
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-server
>    Affects Versions: trunk, 2.6.2
>            Reporter: amarnath reddy pappu
>            Assignee: Aleksandr Kovalenko
>            Priority: Major
>             Fix For: 2.7.2
>
>
> According to details found at https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/phishing-by-navigating-browser-tabs/, it is possible to change the "window.opener.location" value in browser windows opened using normal anchor tags where the "target" attribute is specified as "_blank".
> This gives an attacker the ability to change the parent location and thus potentially allow for a phishing attack to invoked.
> To help this situation, it is suggested that the following attribute be set along with the "target" attribute:
> {noformat}
> rel="noopener noreferrer"
> {noformat}
> For example:
> {noformat}
> <a href="..." target="_blank" rel="noopener noreferrer">...</a>
> {noformat}



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)