Apache Ranger: Stored XSS in Edit Service page - Add logic to validate user input
Description
Stored XSS vulnerability in Edit Service Page of Apache Ranger UI in Apache Ranger Version 2.4.0. Users are recommended to upgrade to version Apache Ranger 2.5.0, which fixes this issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Ranger 2.4.0 contains a stored XSS vulnerability in the Edit Service page, allowing attackers to inject malicious scripts that execute when administrators view the compromised service configuration.
Vulnerability
Description
CVE-2024-45478 is a stored cross-site scripting (XSS) vulnerability found in the Edit Service Page of Apache Ranger UI, affecting Apache Ranger version 2.4.0 [2]. The root cause is insufficient validation of user-supplied input when editing service configurations, allowing an attacker to store arbitrary JavaScript code that will execute in the context of other users who view the affected page [1].
Exploitation
An attacker with access to the Apache Ranger policy admin UI can exploit this flaw by injecting malicious scripts into service fields during the editing process [4]. No special privileges beyond normal administrative access to the Ranger interface are required; the payload is stored on the server and delivered to any user—including other administrators—who navigates to the Edit Service page [1][4].
Impact
Successful exploitation enables the attacker to execute arbitrary JavaScript in the victim's browser session. This can lead to session hijacking, theft of authentication cookies, unauthorized modifications to Ranger policies, and further compromise of the data security controls managed by Apache Ranger [1].
Mitigation
Apache has released version 2.5.0, which adds proper input validation logic to prevent this stored XSS issue [1][2]. Users running Apache Ranger 2.4.0 are strongly recommended to upgrade to 2.5.0 or later [4]. No workarounds other than upgrading have been indicated by the vendor [1][2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.ranger:rangerMaven | < 2.5.0 | 2.5.0 |
Affected products
3- Apache Software Foundation/Apache Rangerv5Range: 2.4.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Rangerghsavendor-advisoryWEB
- github.com/advisories/GHSA-vrx2-mgr9-v67hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-45478ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/01/21/3ghsaWEB
News mentions
0No linked articles in our index yet.