VYPR
Moderate severityNVD Advisory· Published Jan 21, 2025· Updated Jun 10, 2025

Apache Ranger: Stored XSS in Edit Service page - Add logic to validate user input

CVE-2024-45478

Description

Stored XSS vulnerability in Edit Service Page of Apache Ranger UI in Apache Ranger Version 2.4.0. Users are recommended to upgrade to version Apache Ranger 2.5.0, which fixes this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Ranger 2.4.0 contains a stored XSS vulnerability in the Edit Service page, allowing attackers to inject malicious scripts that execute when administrators view the compromised service configuration.

Vulnerability

Description

CVE-2024-45478 is a stored cross-site scripting (XSS) vulnerability found in the Edit Service Page of Apache Ranger UI, affecting Apache Ranger version 2.4.0 [2]. The root cause is insufficient validation of user-supplied input when editing service configurations, allowing an attacker to store arbitrary JavaScript code that will execute in the context of other users who view the affected page [1].

Exploitation

An attacker with access to the Apache Ranger policy admin UI can exploit this flaw by injecting malicious scripts into service fields during the editing process [4]. No special privileges beyond normal administrative access to the Ranger interface are required; the payload is stored on the server and delivered to any user—including other administrators—who navigates to the Edit Service page [1][4].

Impact

Successful exploitation enables the attacker to execute arbitrary JavaScript in the victim's browser session. This can lead to session hijacking, theft of authentication cookies, unauthorized modifications to Ranger policies, and further compromise of the data security controls managed by Apache Ranger [1].

Mitigation

Apache has released version 2.5.0, which adds proper input validation logic to prevent this stored XSS issue [1][2]. Users running Apache Ranger 2.4.0 are strongly recommended to upgrade to 2.5.0 or later [4]. No workarounds other than upgrading have been indicated by the vendor [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.ranger:rangerMaven
< 2.5.02.5.0

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.