[
https://issues.apache.org/jira/browse/DRILL-7276?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16847648#comment-16847648
]
ASF GitHub Bot commented on DRILL-7276:
---------------------------------------
agozhiy commented on issue #1795: DRILL-7276: Fixed an XSS vulnerability in
Drill Web-UI query profile …
URL: https://github.com/apache/drill/pull/1795#issuecomment-495681238
@vvysotskyi thanks for finding this case, fixed it now.
Cannot find any other dangerous usages of html() function, in most of the
cases we use FreeMarker to substitute values.
Please, review.
----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:
[email protected]
> xss(bug) in apache drill Web UI latest verion 1.16.0 when authenticated
> ------------------------------------------------------------------------
>
> Key: DRILL-7276
> URL: https://issues.apache.org/jira/browse/DRILL-7276
> Project: Apache Drill
> Issue Type: Bug
> Components: Web Server
> Affects Versions: 1.16.0
> Reporter: shuiboye
> Assignee: Anton Gozhiy
> Priority: Major
> Fix For: 1.17.0
>
> Attachments: 1.png, 2.png, 4.png
>
>
> In the query page,I select the "SQL" of the "Query Type" and in the "Query"
> field I input "*select '<svg/onload=alert(/xss/)>' FROM cp.`employee.json`*".
> !1.png!
> After submitting,I get the Query Profile whose url is
> "*[http://127.0.0.1:8047/profiles/231beb11-4b43-0762-8b90-76a9af2edd24]*".
> !2.png!
> Any user who visits the profile page and clicks "JSON profile" at the bottom
> to see the FULL JSON Profile will see two alert boxes as shown below.
> !4.png!
>
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)