[
https://issues.apache.org/jira/browse/AMBARI-25384?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16941733#comment-16941733
]
Hudson commented on AMBARI-25384:
---------------------------------
SUCCESS: Integrated in Jenkins build Ambari-branch-2.7 #578 (See
[https://builds.apache.org/job/Ambari-branch-2.7/578/])
AMBARI-25384 Ambari Files View is Vulnerable to XSS attack (asnaik) (github:
[https://gitbox.apache.org/repos/asf?p=ambari.git&a=commit&h=47080774506b7011b02e4d6f7afba16c87f212b6])
* (edit)
contrib/views/files/src/main/resources/ui/app/services/alert-messages.js
* (edit)
contrib/views/files/src/main/resources/ui/app/components/delete-modal.js
> Ambari Files View is Vulnerable to XSS attack
> ---------------------------------------------
>
> Key: AMBARI-25384
> URL: https://issues.apache.org/jira/browse/AMBARI-25384
> Project: Ambari
> Issue Type: Bug
> Components: ambari-views
> Affects Versions: trunk, 2.6.2, 2.7.4
> Reporter: Akhil Naik
> Assignee: Akhil Naik
> Priority: Major
> Labels: pull-request-available
> Attachments: Screen Shot 2019-09-24 at 6.05.19 PM.png
>
> Time Spent: 40m
> Remaining Estimate: 0h
>
> Problem Statement : Ambari Files view is vulnerable to XSS attack, if the
> Filename of the file uploaded in HDFS contains XSS scripts.
> Reproduction :
> 1) login to files view
> 2) create a file called in your local system and upload it to files view:
> <svg onload= alert(document.domain)>
> 3) try to delete the file or edit permission of the file. the malciious XSS
> script will be executed in the Browser. this is a security Issue.
> Please see attached screenshot
--
This message was sent by Atlassian Jira
(v8.3.4#803005)