[ 
https://issues.apache.org/jira/browse/SPARK-40684?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17682272#comment-17682272
 ] 

Eugene Shinn (Truveta) commented on SPARK-40684:
------------------------------------------------

I think I filed [SPARK-39740] vis-timeline @ 4.2.1 vulnerable to XSS attacks - 
ASF JIRA (apache.org) for the same issue, but haven't seen any updates on that 
ticket either.

> Update embedded vis-timeline javascript resources
> -------------------------------------------------
>
>                 Key: SPARK-40684
>                 URL: https://issues.apache.org/jira/browse/SPARK-40684
>             Project: Spark
>          Issue Type: Bug
>          Components: Spark Core
>    Affects Versions: 3.3.0
>            Reporter: Andrew Kyle Purtell
>            Priority: Major
>
> Spark 3.3 currently ships with embedded vis-timeline javascript resources 
> subject to CVE-2020-28487, detected as a minor problem by several static 
> vulnerability assessment tools.
> https://nvd.nist.gov/vuln/detail/CVE-2020-28487: 
> bq. This affects the package vis-timeline before 7.4.4. An attacker with the 
> ability to control the items of a Timeline element can inject additional 
> script code into the generated application.
> This issue is not meant to imply a security problem in Spark itself. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to