[ 
https://issues.apache.org/jira/browse/AMBARI-24634?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Levas reassigned AMBARI-24634:
-------------------------------------

    Assignee: Robert Levas

> Ambari Cross Site Scripting Vulnerability
> -----------------------------------------
>
>                 Key: AMBARI-24634
>                 URL: https://issues.apache.org/jira/browse/AMBARI-24634
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-web
>    Affects Versions: 2.6.2
>         Environment: Ambari 2.6.2.2
> HDP 2.6.5.0
>            Reporter: Andrzej Jedrzejewski
>            Assignee: Robert Levas
>            Priority: Major
>
> The attack was done through the Ambari "Files" module. It occurred when 
> creating a new folder on the application by clicking on the "New Folder" 
> option. From here I named the folder as 
> "><svg/onload="alert(document.domain)">.
> Once you save the payload as the new folder the page will refresh and from 
> there the application will load the payload and execute the javascript within 
> the "onload" attribute.
> Here is the HTTP request used for this attack.
> PUT 
> /ambarihost/gateway/ambari/api/v1/views/FILES/versions/1.0.0/instances/AUTO_FILES_INSTANCE/resources/files/fileops/mkdir
>  HTTP/1.1
> [Redacted...]
> {"path":"/test\"><svg/onload=\"alert(document.domain);\">"}



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to