You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Akhil Naik (Jira)" <ji...@apache.org> on 2019/10/01 05:58:00 UTC

[jira] [Commented] (AMBARI-25384) Ambari Files View is Vulnerable to XSS attack

    [ https://issues.apache.org/jira/browse/AMBARI-25384?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16941546#comment-16941546 ] 

Akhil Naik commented on AMBARI-25384:
-------------------------------------

The Root Cause of this issue is, when ever we do a call to : this.get('logger') and then write danger or warn messages to alert it in UI, it was executed in DOM with direct message we passed to it , which need to be HTML safe .


Added the escapeExpression call in the places where we where sending direct data to DOM .



> Ambari Files View is Vulnerable to XSS attack
> ---------------------------------------------
>
>                 Key: AMBARI-25384
>                 URL: https://issues.apache.org/jira/browse/AMBARI-25384
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-views
>    Affects Versions: trunk, 2.6.2, 2.7.4
>            Reporter: Akhil Naik
>            Assignee: Akhil Naik
>            Priority: Major
>              Labels: pull-request-available
>         Attachments: Screen Shot 2019-09-24 at 6.05.19 PM.png
>
>          Time Spent: 10m
>  Remaining Estimate: 0h
>
> Problem Statement :  Ambari Files view is vulnerable to XSS attack, if the Filename of the file uploaded in HDFS contains XSS scripts.
> Reproduction : 
> 1) login to files view
> 2) create a file called in your local system and upload it to files view: <svg onload= alert(document.domain)>
> 3) try to delete the file or edit permission of the file. the malciious XSS script will be executed in the Browser. this is a security Issue.
> Please see attached screenshot



--
This message was sent by Atlassian Jira
(v8.3.4#803005)