[ 
https://issues.apache.org/jira/browse/AMBARI-25384?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16941733#comment-16941733
 ] 

Hudson commented on AMBARI-25384:
---------------------------------

SUCCESS: Integrated in Jenkins build Ambari-branch-2.7 #578 (See 
[https://builds.apache.org/job/Ambari-branch-2.7/578/])
AMBARI-25384 Ambari Files View is Vulnerable to XSS attack (asnaik) (github: 
[https://gitbox.apache.org/repos/asf?p=ambari.git&a=commit&h=47080774506b7011b02e4d6f7afba16c87f212b6])
* (edit) 
contrib/views/files/src/main/resources/ui/app/services/alert-messages.js
* (edit) 
contrib/views/files/src/main/resources/ui/app/components/delete-modal.js


> Ambari Files View is Vulnerable to XSS attack
> ---------------------------------------------
>
>                 Key: AMBARI-25384
>                 URL: https://issues.apache.org/jira/browse/AMBARI-25384
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-views
>    Affects Versions: trunk, 2.6.2, 2.7.4
>            Reporter: Akhil Naik
>            Assignee: Akhil Naik
>            Priority: Major
>              Labels: pull-request-available
>         Attachments: Screen Shot 2019-09-24 at 6.05.19 PM.png
>
>          Time Spent: 40m
>  Remaining Estimate: 0h
>
> Problem Statement :  Ambari Files view is vulnerable to XSS attack, if the 
> Filename of the file uploaded in HDFS contains XSS scripts.
> Reproduction : 
> 1) login to files view
> 2) create a file called in your local system and upload it to files view: 
> <svg onload= alert(document.domain)>
> 3) try to delete the file or edit permission of the file. the malciious XSS 
> script will be executed in the Browser. this is a security Issue.
> Please see attached screenshot



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to