Improper neutralization of input during web page generation ('cross-site scripting') in Azure HDInsights allows an authorized attacker to perform spoofing over a network.
According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability. What additional customer action is needed to be protected? The customer action needed is to restart Ambari server in both of the head nodes to have this fix updated.
<a href="https://www.linkedin.com/in/tomer-nahum-977a021b5/">Tomer Nahum</a> with <a href="https://www.semperis.com/">Semperis</a>