{ "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-26544", "STATE": "PUBLIC", "TITLE": "Apache Livy (Incubating) is vulnerable to cross site scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Livy (Incubating)", "version": { "version_data": [ { "version_affected": "=", "version_name": "Apache Livy (Incubating)", "version_value": "0.7.0-incubating" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "We would like to thank Andras Beni for reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": {}, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "url": "https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d", "name": "https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d" }, { "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E", "name": "https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E" }, { "refsource": "MLIST", "name": "[oss-security] 20210220 CVE-2021-26544: Apache Livy (Incubating) is vulnerable to cross site scripting", "url": "http://www.openwall.com/lists/oss-security/2021/02/20/1" } ] }, "source": { "defect": [ "https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d" ], "discovery": "UNKNOWN" }, "work_around": [ { "lang": "eng", "value": "Users can upgrade to 0.7.1-incubating or apply the patch at the github URL." } ] }