<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Vulnerability alert on my HDP 3.1.0.0-78 version.  (jquery). in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298427#M219165</link>
    <description>&lt;P&gt;This is the yarn parameter that holds the port 8042:&lt;/P&gt;&lt;P&gt;yarn.nodemanager.webapp.address&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jun 2020 19:11:15 GMT</pubDate>
    <dc:creator>DavidGM</dc:creator>
    <dc:date>2020-06-22T19:11:15Z</dc:date>
    <item>
      <title>Vulnerability alert on my HDP 3.1.0.0-78 version.  (jquery).</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298142#M219013</link>
      <description>&lt;P&gt;It says a problem with the current version of jquery.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;URL :&amp;nbsp; "&lt;A href="https://slack-redir.net/link?url=http%3A%2F%2F9.51.168.220%3A8042%2Fstatic%2Fjquery%2Fjquery-3.3.1.min.js&amp;amp;v=3" target="_blank" rel="noopener noreferrer"&gt;http://&amp;lt;myip&amp;gt;:8042/static/jquery/jquery-3.3.1.min.js&lt;/A&gt;" Installed version : 3.3.1 Fixed version : 3.5.0&lt;/P&gt;&lt;P&gt;Vulnerability link:&lt;/P&gt;&lt;P&gt;" &lt;A href="https://www.tenable.com/plugins/nessus/136929" target="_blank" rel="noopener"&gt;https://www.tenable.com/plugins/nessus/136929&lt;/A&gt;"&lt;/P&gt;&lt;P&gt;Finding description: JQuery 1.2 &amp;gt; 3.50 XSS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there like a workaround to overcome this vulnerability ?&amp;nbsp; or is necessary to upgrade to a newer version of HDP?&lt;/P&gt;&lt;P&gt;Would be possible to upgrade jquery version only ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance..!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 21:09:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298142#M219013</guid>
      <dc:creator>DavidGM</dc:creator>
      <dc:date>2020-06-16T21:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability alert on my HDP 3.1.0.0-78 version.  (jquery).</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298427#M219165</link>
      <description>&lt;P&gt;This is the yarn parameter that holds the port 8042:&lt;/P&gt;&lt;P&gt;yarn.nodemanager.webapp.address&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 19:11:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298427#M219165</guid>
      <dc:creator>DavidGM</dc:creator>
      <dc:date>2020-06-22T19:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability alert on my HDP 3.1.0.0-78 version.  (jquery).</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298483#M219200</link>
      <description>&lt;P&gt;Looks like the vulnerability is still present on the latest release of&lt;STRONG&gt; HDP&amp;nbsp; v3.1.5.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;That means that, so far, there is not way to solve it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully,&amp;nbsp; downloading the new library from jquery.com&amp;nbsp; would help,&amp;nbsp; but still&amp;nbsp; instructions about what, how and where do the modifications still will be required by Cloudera engineers.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2020 19:03:30 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298483#M219200</guid>
      <dc:creator>DavidGM</dc:creator>
      <dc:date>2020-06-23T19:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability alert on my HDP 3.1.0.0-78 version.  (jquery).</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298486#M219202</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/79098"&gt;@DavidGM&lt;/a&gt;&amp;nbsp;&amp;nbsp;You have a few options here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. &amp;nbsp;Your yarn UI probably should not just be wide open to vulnerability scans. Consider securing the UI, blocking external access to unauthorized parties. &amp;nbsp;Check out kerberos, yarn + SSL, LDAP/AD, etc. &amp;nbsp;If the scanning application cannot see the UI, they cannot see or try to read the jQuery versions. &amp;nbsp;This is then a pass. &amp;nbsp; This is a standard practice for internally facing applications versus live web/ip public applications that are vulnerable to automated version exploits. &amp;nbsp;That said, I am an advocate for passing the scans, not just firewalling them away.&lt;/P&gt;&lt;P&gt;2. &amp;nbsp;You &lt;U&gt;&lt;EM&gt;could&lt;/EM&gt;&lt;/U&gt; build Yarn from source yourself with the jQuery versions that satisfy your scan requirements. &amp;nbsp;This requires some serious thought and planning as it isn't a simple task and would not be supported through traditional channels.&lt;/P&gt;&lt;P&gt;3. &amp;nbsp;You can hack into the file system and change the files directly. &amp;nbsp;Similar to #2, this is going to be unsupported, but sometimes, you just have to do whatever it takes to pass a vulnerability scan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, lets look under the hood for where these files exist for #3. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;[root@c7301 /]# find . -name 'jquery-3.3.1.min.js'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;./usr/hdp/3.1.0.0-78/hadoop-hdfs/webapps/static/jquery-3.3.1.min.js&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;./hadoop/yarn/local/filecache/10/mapreduce.tar.gz/hadoop/share/hadoop/hdfs/webapps/static/jquery-3.3.1.min.js&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN&gt;[root@c7301 hadoop-hdfs]# grep -lr 'jquery-3.3.1.min.js' *&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-3.1.1.3.1.0.0-78-tests.jar&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-tests.jar&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;webapps/datanode/datanode.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;webapps/hdfs/dfshealth.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;webapps/hdfs/explorer.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;webapps/journal/index.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;webapps/router/federationhealth.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;webapps/secondary/status.html&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;For #2, these are relevant file searches on the source code:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;[root@c7301 hadoop-3.2.1-src]# find . -name *.min.js | grep jquery&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;./hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/src/main/resources/webapps/static/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;jquery&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;jquery&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;-ui-1.12.1.custom.min.js&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;./hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/src/main/resources/webapps/static/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;jquery&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;jquery&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;-3.3.1.min.js&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;./hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/src/main/resources/webapps/static/dt-1.10.7/js/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;jquery&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.dataTables.min.js&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;./hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/static/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;jquery&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.dataTables.min.js&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;./hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/static/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;jquery&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;-3.3.1.min.js&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN&gt;[root@c7301 hadoop-3.2.1-src]# grep -lr '.min.js' *&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/server/namenode/TestUpgradeDomainBlockPlacementPolicy.java&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/hdfs/explorer.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/hdfs/dfshealth.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/journal/index.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/datanode/datanode.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/secondary/status.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/pom.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs-rbf/src/main/webapps/router/federationhealth.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-tools/hadoop-sls/src/test/resources/simulate.html.template&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-tools/hadoop-sls/src/test/resources/track.html.template&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-tools/hadoop-sls/src/main/html/simulate.html.template&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-tools/hadoop-sls/src/main/html/showSimulationTrace.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-tools/hadoop-sls/src/main/html/track.html.template&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-tools/hadoop-sls/pom.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/src/main/java/org/apache/hadoop/yarn/webapp/view/JQueryUI.java&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/pom.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/ember-cli-build.js&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;LICENSE.txt&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN&gt;[root@c7301 hadoop-3.2.1-src]# grep -lr 'jquery-3.3.1.min.js' *&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/hdfs/explorer.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/hdfs/dfshealth.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/journal/index.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/datanode/datanode.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/src/main/webapps/secondary/status.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs/pom.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-hdfs-project/hadoop-hdfs-rbf/src/main/webapps/router/federationhealth.html&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/src/main/java/org/apache/hadoop/yarn/webapp/view/JQueryUI.java&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/pom.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;LICENSE.txt&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this answer resolves your issue or allows you to move forward, please choose to ACCEPT this solution and close this topic. If you have further dialogue on this topic please comment here or feel free to private message me. If you have new questions related to your Use Case please create separate topic and feel free to tag me in your post. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Steven&amp;nbsp;@ DFHZ&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2020 20:29:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298486#M219202</guid>
      <dc:creator>stevenmatison</dc:creator>
      <dc:date>2020-06-23T20:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability alert on my HDP 3.1.0.0-78 version.  (jquery).</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298650#M219299</link>
      <description>&lt;P&gt;Thanks for the information Steven.&lt;/P&gt;&lt;P&gt;I will be visiting the options you provided and see if I can make a progress hoping not to break the things.&lt;/P&gt;&lt;P&gt;Do you know if in a future release of HDP will cover this vulnerability ?&lt;/P&gt;&lt;P&gt;And again,&amp;nbsp; thanks a lot for your inputs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 17:48:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Vulnerability-alert-on-my-HDP-3-1-0-0-78-version-jquery/m-p/298650#M219299</guid>
      <dc:creator>DavidGM</dc:creator>
      <dc:date>2020-06-25T17:48:40Z</dc:date>
    </item>
  </channel>
</rss>

