
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN118
_____________________________________________________________________

DATE                : 24/02/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Livy versions
                                0.7.0-incubating.

=====================================================================
http://mail-archives.apache.org/mod_mbox/livy-user/202102.mbox/%3cCANvfmP-p1bGk=0o=bBYkbaRmx7+pHDFvwtkrjV_7FY8JJ2kzLg@mail.gmail.com%3e
_____________________________________________________________________

Description:

Livy server version 0.7.0-incubating (only) is vulnerable to a cross
site scripting issue in the session name.  A malicious user could use
this flaw to access logs and results of other users' sessions and run
jobs with their privileges.  This issue is fixed in Livy
0.7.1-incubating.

This issue is being tracked as
https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d

Mitigation:

Users can upgrade to 0.7.1-incubating or apply the patch at the github URL.

Credit:

We would like to thank Andras Beni for reporting this issue

References:
https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



