Andrii Babiichuk created AMBARI-25283:
-----------------------------------------
Summary: Ambari UI evaluates Javascript embedded in user input
when adding hosts, adding remote clusters, and renaming the cluster
Key: AMBARI-25283
URL: https://issues.apache.org/jira/browse/AMBARI-25283
Project: Ambari
Issue Type: Bug
Components: ambari-admin
Affects Versions: 2.7.3
Reporter: Andrii Babiichuk
Assignee: Andrii Babiichuk
Fix For: 2.7.4
Ambari's UI evaluates Javascript blocks embedded in user input when adding
hosts, adding remote clusters, and renaming the cluster.
The script evaluation appears to occur before the data is submitted and saved
to the Ambari database (if save at all). Therefore, no XSS vulnerability needs
to be reported since the scope of the threat is only to the interactive user at
the instance the data is evaluated.
*Add remote cluster steps to reproduce:*
# Log into ambari and navigate to admin > Manage Ambari> Cluster Management>
Remote Cluster > Register Remote Cluster
# Enter malicious script in Ambari Cluster URL textbox and click on save. The
output of XSS is reflected.
*Add hosts steps to reproduce:*
# Log into ambari and navigate to Hosts> Actions> Add New Hosts
# Enter malicious script in Target Hosts textbox and click on save. The output
of XSS is reflected
*Edit cluster name steps to reproduce:*
# Log into ambari and navigate to admin > Manage Ambari> Cluster Management>
Cluster Information
# Enter malicious script in Cluster Name textbox. The output of XSS is reflected
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)