You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
A stored XSS in jaeger UI might allow an attacker who controls a trace to perform arbitrary jaeger queries
Jaeger UI is using the json-markup dependency to display span attributes and resources. This dependency is not sanitising keys of an object though, thus the KeyValuesTable is vulnerable to XSS.
Related UI vulnerability advisory: GHSA-vv24-rm95-q56r
Summary
Jaeger UI is using the
json-markup
dependency to display span attributes and resources. This dependency is not sanitising keys of an object though, thus theKeyValuesTable
is vulnerable to XSS.Details
The vulnerable line is here: https://github.com/jaegertracing/jaeger-ui/blob/main/packages/jaeger-ui/src/components/TracePage/TraceTimelineViewer/SpanDetail/KeyValuesTable.tsx#L49
PoC
Impact
This is a XSS on Jaeger UI. XSS can be used to run JavaScript.
References