[
https://issues.apache.org/jira/browse/AMBARI-24509?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16590103#comment-16590103
]
Hudson commented on AMBARI-24509:
---------------------------------
FAILURE: Integrated in Jenkins build Ambari-branch-2.6 #697 (See
[https://builds.apache.org/job/Ambari-branch-2.6/697/])
AMBARI-24509 : Security vulnerabilities with Hive view (XSS) (github:
[https://gitbox.apache.org/repos/asf?p=ambari.git&a=commit&h=64551dfc719bbd49dd7b7791b7cb700121709a88])
* (edit)
contrib/views/hive20/src/main/resources/ui/app/components/create-table.js
* (edit)
contrib/views/hive20/src/main/resources/ui/app/templates/components/alert-message.hbs
* (edit)
contrib/views/hive20/src/main/resources/ui/app/templates/components/create-table.hbs
* (edit) contrib/views/hive20/src/main/resources/ui/package.json
* (edit) contrib/views/hive20/src/main/resources/ui/yarn.lock
* (edit)
contrib/views/hive20/src/main/resources/ui/app/templates/components/column-item.hbs
* (edit)
contrib/views/hive20/src/main/resources/ui/app/components/column-item.js
> Security vulnerabilities with Hive view (XSS)
> ---------------------------------------------
>
> Key: AMBARI-24509
> URL: https://issues.apache.org/jira/browse/AMBARI-24509
> Project: Ambari
> Issue Type: Bug
> Components: ambari-views
> Affects Versions: 2.6.0
> Reporter: Nitiraj Singh Rathore
> Assignee: Nitiraj Singh Rathore
> Priority: Major
> Labels: pull-request-available
> Fix For: 2.6.2
>
> Time Spent: 40m
> Remaining Estimate: 0h
>
> It is possible for an attacker to steal information or access from users by
> executing malicious javascript. This is possible due to hive directly taking
> data/information from events and directly populating messages, this includes
> directly inserting data that contains html or javascript code. Leveraging
> this one user could create a malicious message to steal access or information
> of another user. Upon viewing the malicious message the vicitim would be
> comprimised by directly scraping any information on the page, modify its
> appearence, or having their session information stolen.
> Bug reproduce steps:
> 1. go to Hive view from Ambari
> 2. click on 'Tables' and click on '+' to create a new table
> 3. In the table name input: '"<img src=x onerror=alert(document.domain)>"'
> and add a column with name <img src=x onerror=alert(document.domain)> and
> datatype TINYINT and click on create
> 4. There is a javascript popup showing the document name and domain name
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)