Impact
This is a Cross-Site Scripting (XSS) vulnerability affecting the DataHub V1 UI. Users interacting with the V1 UI could be vulnerable to XSS attacks when viewing content in the sidebar section showing descriptions. The vulnerability could potentially allow attackers to inject and execute malicious JavaScript code in the context of other users' browsers.
The issue specifically affects users of the DataHub V1 UI, while V2 UI users are not impacted as proper sanitization is already implemented there.
Patches
The vulnerability has been patched in Pull Request #13203.
Users should update to the version containing this fix to mitigate the vulnerability.
Workarounds
If you cannot upgrade immediately, consider the following workarounds:
Use the DataHub V2 UI if available, which already implements proper sanitization
Limit access to the API to trusted users only, as the vulnerability was only exploitable through direct API calls
References
Fix Pull Request: #13203
Additional Notes
This vulnerability was only exploitable through direct API calls, as the UI was already sanitizing inputs before sending them to the backend
The V2 UI has proper sanitization in place and is not affected by this vulnerability
Credit
Celal Furkan Ozer
Impact
This is a Cross-Site Scripting (XSS) vulnerability affecting the DataHub V1 UI. Users interacting with the V1 UI could be vulnerable to XSS attacks when viewing content in the sidebar section showing descriptions. The vulnerability could potentially allow attackers to inject and execute malicious JavaScript code in the context of other users' browsers.
The issue specifically affects users of the DataHub V1 UI, while V2 UI users are not impacted as proper sanitization is already implemented there.
Patches
The vulnerability has been patched in Pull Request #13203.
Users should update to the version containing this fix to mitigate the vulnerability.
Workarounds
If you cannot upgrade immediately, consider the following workarounds:
Use the DataHub V2 UI if available, which already implements proper sanitization
Limit access to the API to trusted users only, as the vulnerability was only exploitable through direct API calls
References
Fix Pull Request: #13203
Additional Notes
This vulnerability was only exploitable through direct API calls, as the UI was already sanitizing inputs before sending them to the backend
The V2 UI has proper sanitization in place and is not affected by this vulnerability
Credit
Celal Furkan Ozer