Description
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
Remediation
References
http://www.openwall.com/lists/oss-security/2021/02/20/1
https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d
https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E
Related Vulnerabilities
CVE-2022-36313 Vulnerability in maven package org.webjars.npm:file-type
CVE-2020-28481 Vulnerability in maven package org.webjars.npm:socket.io
CVE-2020-5289 Vulnerability in maven package com.yahoo.elide:elide-core
CVE-2018-1304 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2022-3510 Vulnerability in maven package com.google.protobuf:protobuf-javalite