Description
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
Remediation
References
http://www.openwall.com/lists/oss-security/2021/02/20/1
https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d
https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E
Related Vulnerabilities
CVE-2020-17521 Vulnerability in maven package org.codehaus.groovy:groovy
CVE-2021-23399 Vulnerability in npm package wincred
CVE-2016-4978 Vulnerability in maven package org.apache.activemq:artemis-jms-client
CVE-2020-35460 Vulnerability in maven package net.sf.mpxj:mpxj
CVE-2020-7686 Vulnerability in npm package rollup-plugin-dev-server