Monday, July 15, 2024

8 XSS Vulnerabilities in Azure HDInsight Allow Attackers to Deliver Malicious Payloads

Azure HDInsight has been identified with multiple Cross-Site Scripting – XSS vulnerabilities related to Stored XSS and Reflected XSS. The severity for these vulnerabilities ranges between 4.5 (Medium) and 4.6 (Medium). 

These vulnerabilities have affected multiple products, including Azure Apache Oozie, Apache Ambari, Jupyter Notebooks, Apache Hadoop, and Apache Hive 2. However, Microsoft fixed these vulnerabilities on their 8th August Security update.

Stored XSS

As per the reports shared with Cyber Security News, 6 Stored XSS vulnerabilities and 2 Reflected XSS vulnerabilities were discovered, of which 4 of the Stored XSS vulnerabilities existed on the Apache Ambari. 

These vulnerabilities were related to YARN Configurations, YARN Queue Manager, Background Operations, and Managed Notifications. All of these vulnerabilities are categorized under CVE-2023-36881.

The other two Stored XSS existed on the Jupyter Notebooks and Apache Woozie, categorized under CVE-2023-35394 and CVE-2023-36877, respectively.

CVE-2023-35394 was related to a Code Execution in the Jupyter Notebooks and had a severity of 4.6 (Medium), whereas CVE-2023-36877 was related to a Web Console Stored XSS and had a severity of 4.5 (Medium).

Get a Demo

Start protecting your SaaS data in just a few minutes!

With DoControl, you can keep your SaaS applications and data safe and secure by creating workflows tailored to your needs. It’s an easy and efficient way to identify and manage risks. You can mitigate the risk and exposure of your organization’s SaaS applications in just a few simple steps.

Reflected XSS 

Furthermore, the two reflected XSS vulnerabilities on the Apache Hadoop and Apache Hive 2 and have been categorized under CVE-2023-38188 and CVE-2023-35393. Both vulnerabilities had a severity of 4.5 (Medium) and can be triggered via endpoint manipulation. 

The list of the vulnerabilities mentioned, their severity, and CVE ID can be found in the following table.

S.NoNameSeverityXSS TypeImpactSeverityCVE
1Azure HDInsight/Apache Ambari Stored XSS in Background OperationsImportantStored XSSSpoofing4.5CVE-2023-36881
2Azure HDInsight/Apache Ambari Stored XSS via Managed NotificationsImportantStored XSSSpoofing4.5CVE-2023-36881
3Azure HDInsight/Apache Ambari Stored XSS in YARN Queue ManagerImportantStored XSSSpoofing4.5CVE-2023-36881
4Azure HDInsight/Jupyter Notebooks Code Execution via Stored XSSImportantStored XSSSpoofing4.6CVE-2023-35394
5Azure HDInsight/Apache Hadoop Reflected XSS via endpoint manipulationImportantReflected XSSSpoofing4.5CVE-2023-38188
6Azure HDInsight/Apache Hive 2 Reflected XSS via endpoint manipulationImportantReflected XSSSpoofing4.5CVE-2023-35393
7Azure HDInsight/Apache Ambari Stored XSS in YARN ConfigurationsImportantStored XSSSpoofing4.5CVE-2023-36881
8Azure HDInsight/Apache Oozie Web Console Stored XSS via Custom FilterImportantStored XSSSpoofing4.5CVE-2023-36877

Orca Security has published a complete report, providing detailed information about the exploitation, proof-of-concept, and other information. Users of these products should upgrade to the latest version to prevent these vulnerabilities from getting exploited.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles