8 XSS Vulnerabilities Allow Attackers to Deliver Malicious Payloads


Azure HDInsight has been identified with multiple Cross-Site Scripting – XSS vulnerabilities related to Stored XSS and Reflected XSS. The severity for these vulnerabilities ranges between 4.5 (Medium) and 4.6 (Medium). 

These vulnerabilities have affected multiple products, including Azure Apache Oozie, Apache Ambari, Jupyter Notebooks, Apache Hadoop, and Apache Hive 2. However, Microsoft fixed these vulnerabilities on their 8th August Security update.

Stored XSS

As per the reports shared with Cyber Security News, 6 Stored XSS vulnerabilities and 2 Reflected XSS vulnerabilities were discovered, of which 4 of the Stored XSS vulnerabilities existed on the Apache Ambari. 

These vulnerabilities were related to YARN Configurations, YARN Queue Manager, Background Operations, and Managed Notifications. All of these vulnerabilities are categorized under CVE-2023-36881.

The other two Stored XSS existed on the Jupyter Notebooks and Apache Woozie, categorized under CVE-2023-35394 and CVE-2023-36877, respectively.

CVE-2023-35394 was related to a Code Execution in the Jupyter Notebooks and had a severity of 4.6 (Medium), whereas CVE-2023-36877 was related to a Web Console Stored XSS and had a severity of 4.5 (Medium).

Document

Get a Demo

With DoControl, you can keep your SaaS applications and data safe and secure by creating workflows tailored to your needs. It’s an easy and efficient way to identify and manage risks. You can mitigate the risk and exposure of your organization’s SaaS applications in just a few simple steps.

Reflected XSS 

Furthermore, the two reflected XSS vulnerabilities on the Apache Hadoop and Apache Hive 2 and have been categorized under CVE-2023-38188 and CVE-2023-35393. Both vulnerabilities had a severity of 4.5 (Medium) and can be triggered via endpoint manipulation. 

The list of the vulnerabilities mentioned, their severity, and CVE ID can be found in the following table.

Orca Security has published a complete report, providing detailed information about the exploitation, proof-of-concept, and other information. Users of these products should upgrade to the latest version to prevent these vulnerabilities from getting exploited.

Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.





Source link