Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CADz7AfyE_MiBc9Gi-aP0UmWsXtGW1sVGhVe7ahLr6JAPMzwvoA@mail.gmail.com>
Date: Tue, 15 Sep 2020 11:15:41 +0530
From: Keval Bhatt <kbhatt@...che.org>
To: oss-security@...ts.openwall.com
Subject: Fwd: [CVE-2020-13928 ] Apache Atlas Multiple XSS Vulnerability

Hello,



Please find below details on CVE fixed in Apache Atlas releases *2.1.0*

-------------------------------------------------------------------------------------------------

CVE-2020-13928:         Atlas was found vulnerable to a Cross-Site
Scripting in Basic Search functionality.

Severity:                      Critical

Vendor:                        The Apache Software Foundation

Versions affected:        Apache Atlas versions 2.0.0

Users affected:            Apache Atlas UI search functionality, Save Search

Description:                  Apache Atlas Multiple XSS Vulnerability

Fix detail:                     Apache Atlas was updated to sanitize the
user input and while rendering

Mitigation:                    Users should upgrade to 2.1.0 or later
version of Apache Atlas

Credit:                         MichaƂ Orzechowski


-------------------------------------------------------------------------------------------------



Thanks,

Keval

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.