Lack of proper input validation and constraint enforcement in Apache Ambari prior to 2.7.8
Impact : As it will be stored XSS, Could be exploited to perform unauthorized actions, varying from data access to session hijacking and delivering malicious payloads.
Users are recommended to upgrade to version 2.7.8 which fixes this issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/03/01/5 | Mailing List |
https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c | Mailing List Vendor Advisory |
Configurations
History
28 May 2025, 19:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:* | |
First Time |
Apache
Apache ambari |
|
References | () https://lists.apache.org/thread/6hn0thq743vz9gh283s2d87wz8tqh37c - Mailing List, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/01/5 - Mailing List |
Information
Published : 2024-03-01 15:15
Updated : 2025-05-28 19:55
NVD link : CVE-2023-50378
Mitre link : CVE-2023-50378
CVE.ORG link : CVE-2023-50378
JSON object : View
Products Affected
apache
- ambari
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')