[
https://issues.apache.org/jira/browse/YARN-1932?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13974227#comment-13974227
]
Jason Lowe commented on YARN-1932:
----------------------------------
+1 lgtm. I'll commit this later today unless there are any objections.
> Javascript injection on the job status page
> -------------------------------------------
>
> Key: YARN-1932
> URL: https://issues.apache.org/jira/browse/YARN-1932
> Project: Hadoop YARN
> Issue Type: Bug
> Affects Versions: 3.0.0, 0.23.9, 2.5.0
> Reporter: Mit Desai
> Assignee: Mit Desai
> Priority: Blocker
> Attachments: YARN-1932.patch, YARN-1932.patch
>
>
> Scripts can be injected into the job status page as the diagnostics field is
> not sanitized. Whatever string you set there will show up to the jobs page as
> it is ... ie. if you put any script commands, they will be executed in the
> browser of the user who is opening the page.
> We need escaping the diagnostic string in order to not run the scripts.
--
This message was sent by Atlassian JIRA
(v6.2#6252)