First published: Sun May 07 2017(Updated: )
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to DOM XSS in the edit-tag functionality.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Atlas | =0.6.0 | |
Apache Atlas | =0.6.0-rc1 | |
Apache Atlas | =0.6.0-rc2 | |
Apache Atlas | =0.7.0 | |
Apache Atlas | =0.7.0-rc1 | |
Apache Atlas | =0.7.0-rc2 | |
maven/org.apache.atlas:atlas-common | >=0.6.0-incubating<0.7.1-incubating | 0.7.1-incubating |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3152 is categorized as a moderate severity vulnerability due to the potential impact of DOM-based cross-site scripting.
To remediate CVE-2017-3152, upgrade Apache Atlas to version 0.7.1-incubating or later.
CVE-2017-3152 affects Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating.
CVE-2017-3152 is a DOM-based cross-site scripting (XSS) vulnerability found in the edit-tag functionality.
Organizations using Apache Atlas versions 0.6.0 or 0.7.0 should be concerned about CVE-2017-3152 due to the risk of XSS attacks.