orca.security
Open in
urlscan Pro
192.0.66.46
Public Scan
URL:
https://orca.security/resources/blog/cross-site-scripting-vulnerabilities-in-apache-services-azure-hd-insight/
Submission: On September 14 via api from TR — Scanned from DE
Submission: On September 14 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOM<form class="ais-SearchBox-form" novalidate="">
<input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
<button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
<div class="ais-SearchBox-close">
<span class="push-enter-text">Press enter to search</span>
<button class="ais-SearchBox-reset-inner" aria-label="Close Search">
<svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
<path fill-rule="evenodd" clip-rule="evenodd"
d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
fill="white"></path>
</svg>
</button>
</div>
</form>
Text Content
___ * Search * Contact * Login * Login * USA * Europe * Australia * US-Gov * Platform Platform The Orca Platform Secure cloud infrastructure, workloads, data, APIs, and identities with our industry-leading agentless cloud-native application protection platform (CNAPP). * Platform Overview * Cloud Security Posture Management Identify and remediate misconfigurations across clouds * Cloud Workload Protection Protect VMs, containers, and serverless functions * Container and Kubernetes Security Scalable security for containers and Kubernetes for every cloud layer * Cloud Detection & Response 24x7 monitoring and response across the entire cloud attack surface * Vulnerability Management Agentless vulnerability management that prioritizes your most critical risks * Cloud Infrastructure Entitlement Management Secure cloud identities and entitlements * Multi-Cloud Compliance Achieve regulatory compliance with frameworks, benchmarks, and custom checks * Shift Left Security Secure cloud-native apps across the SDLC * SideScanning™ Technology Our innovative approach provides complete cloud coverage * API Security Complete API discovery, security posture management, and drift detection * Data Security and Posture Management Reduce the risk of data breaches and protect sensitive PII * Why Orca Why Orca Case Studies Our customers worldwide trust Orca to secure their Cloud. * View Case Studies Why Orca * Why Orca Learn all about our purpose-built cloud security platform * Our Company Learn about our company, culture and team * Ratings & Reviews See what our users say about us * Security Research The latest discoveries from the Research Pod Compare Orca * Prisma Cloud Many acquisitions and little integration * Qualys TotalCloud Not nearly as total as you want * Lacework More complexity, less visibility * Aqua End up underwater with alert fatigue * Rapid7 Work a lot harder for less * Tenable Fragmented coverage makes this untenable * CloudGuard Doesn’t check all the boxes Industries * Financial Services * Technology * Government * Retail * Healthcare * Media & Entertainment * Partners Partners Our Partners Our team is extended and strengthened by our strong partnerships across the Cloud Security ecosystem. * Partner Overview * Amazon Web Services * Microsoft Azure * Google Cloud * Alibaba Cloud * Oracle Cloud * Research Research Orca Research Pod Our expert security research team discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca platform. * See Our Latest Discoveries Orca Research Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Two XSS Vulnerabilities in Azure with Embedded postMessage IFrames The Top 5 Cloud Security Risks of 2023 (so far) * Resources Resources Resource Library Download and view eBooks, whitepapers, videos and more in our packed Resource Library. * Browse Resources Blog Read Cloud Security thought leadership, how-to's, and insightful posts from Orca Security experts. * Browse Blogs Featured Resources Orca Events & Webinars – Register for Upcoming Webinars and Events 2023 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP) TAG Cyber Report Shows 207% ROI on the Orca Cloud Security Platform * About About Careers Join the Orca team, and help secure the cloud for the world's most innovative companies. * See Open Roles * Why Orca * Newsroom * Media & Press * About Us * Ratings & Reviews * Contact Us * Search * Contact * Login * Login * USA * Europe * Australia * US-Gov * Get Demo Press enter to search * Cloud Risk Superglue: A remediated zero-day vulnerability in AWS Glue * Cloud Risk BreakingFormation: Vulnerability in AWS CloudFormation * Blog Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production Checklists * Event Virtual Cloud Security Camp * On-Demand Webinar The Challenges of Securing & Monitoring Multi-Cloud Applications * Cloud Risk Superglue: A remediated zero-day vulnerability in AWS Glue View more results * Blog * Research Pod Published: Sep 13, 2023 AZURE HDINSIGHT RIDDLED WITH XSS VULNERABILITIES VIA APACHE SERVICES Lidor Ben Shitrit Reading time: 13 Minutes * * * * The Orca Research Pod recently discovered a total of 8 important Cross-Site Scripting (XSS) vulnerabilities within various Apache services on Azure HDInsight, a widely used managed service for open-source analytics. The identified vulnerabilities consisted of 6 Stored XSS and 2 Reflected XSS vulnerabilities, each of which could be exploited to perform unauthorized actions, varying from data access to session hijacking and delivering malicious payloads. Orca uncovered the vulnerabilities by manipulating variables, exploiting functions, and meticulously testing possible security loopholes. Upon the discovery, we immediately informed the Microsoft Service Response Center (MSRC), who were able to reproduce the issues and prioritize their remediation. All 8 XSS vulnerabilities were fixed in the August 8th HDInsight Security Update. In this blog, we’ll describe how we discovered the vulnerabilities and what their impact could have been on Azure HDInsight users, as well as how organizations can protect against these types of XSS vulnerabilities. EXECUTIVE SUMMARY * Orca discovered 8 important Cross-Site Scripting (XSS) vulnerabilities in Apache services, including Apache Hadoop, Spark, and Kafka, all operating under the umbrella of Azure HDInsight. * 6 were Stored XSS vulnerabilities and 2 were Reflected XSS vulnerabilities. * All XSS vulnerabilities posed significant security risks to data integrity and user privacy in the vulnerable Apache services, including session hijacking and delivering malicious payloads, putting any user of the Apache services at risk, including Apache Hadoop, Spark, and Oozie. * Upon discovering the vulnerabilities, Orca promptly reported them to the MSRC team who immediately prioritized the cases. Orca and Microsoft then conducted several meetings to reproduce and remediate all issues. * Microsoft fixed all vulnerabilities in their Patch Tuesday on August 8, 2023. * XSS vulnerabilities can be dangerous but are nevertheless quite common. Recent examples are the Jenkins stored XSS, Zimbra XSS, and Azure Bastion and Azure Container Registry XSS vulnerabilities. * The fact that we found 8 important XSS vulnerabilities in Azure HDInsight via Apache Services in just a matter of days, calls into question the security of the service. * Organizations can reduce their risk of XSS attacks by applying best practices, such as implementing a Content Security Policy (CSP), performing input validation and output encoding, and adhering to the principle of least privilege. ABOUT THE 8 XSS VULNERABILITIES IN AZURE HDINSIGHT Below we have included an overview of the eight vulnerabilities that were found in Azure HDInsight. To protect against these vulnerabilities, organizations must apply Microsoft’s August 2023 security update. NameSeverityXSS TypeImpactCVEStatus#1Azure HDInsight/Apache Ambari Stored XSS in Background OperationsImportantStored XSSSpoofingCVE-2023-36881Fixed in August 8th Security Update#2Azure HDInsight/Apache Ambari Stored XSS via Managed NotificationsImportantStored XSSSpoofingCVE-2023-36881Fixed in August 8th Security Update#3Azure HDInsight/Apache Ambari Stored XSS in YARN Queue ManagerImportantStored XSSSpoofingCVE-2023-36881Fixed in August 8th Security Update#4Azure HDInsight/Jupyter Notebooks Code Execution via Stored XSSImportantStored XSSSpoofingCVE-2023-35394Fixed in August 8th Security Update#5Azure HDInsight/Apache Hadoop Reflected XSS via endpoint manipulationImportantReflected XSSSpoofingCVE-2023-38188Fixed in August 8th Security Update#6Azure HDInsight/Apache Hive 2 Reflected XSS via endpoint manipulationImportantReflected XSSSpoofingCVE-2023-35393Fixed in August 8th Security Update#7Azure HDInsight/Apache Ambari Stored XSS in YARN ConfigurationsImportantStored XSSSpoofingCVE-2023-36881Fixed in August 8th Security Update#8Azure HDInsight/Apache Oozie Web Console Stored XSS via Custom FilterImportantStored XSSSpoofingCVE-2023-36877Fixed in August 8th Security Update WHAT IS AZURE HDINSIGHT? Azure HDInsight is a fully managed, open-source analytics service provided by Microsoft for processing big data workloads in a scalable and flexible way. It’s essentially a cloud-based service that simplifies the management, processing, and analysis of big data by offering a number of data processing frameworks like Apache Hadoop, Apache Spark, Apache Kafka, and others. HDInsight supports a wide range of data processing tasks with open-source frameworks such as Apache Hadoop for batch processing, Apache Spark for in-memory processing, Apache HBase for NoSQL data, Apache Storm and Kafka for real-time processing, and Machine Learning with R Server. HDInsight can be integrated with other Azure services. For example, you can store and manage data using Azure Data Lake Storage or Azure Blob Storage. Similarly, it can be integrated with Azure Data Factory for ETL operations, Azure Synapse Analytics for warehousing, or Power BI for visualization. WHAT IS CROSS-SITE SCRIPTING (XSS)? Cross-Site Scripting (XSS) occurs when an attacker injects malicious scripts into a trusted website, which are then executed by unsuspecting users’ browsers. This can lead to unauthorized access, data theft, and even complete compromise of the affected system. Recent examples are the Jenkins stored XSS, Zimbra XSS, and Azure Bastion and Azure Container Registry XSS vulnerabilities. All 8 XSS vulnerabilities discovered in various platforms and components in Azure HDInsight primarily resulted from the lack of proper input sanitization. This omission allowed malicious characters to be rendered once the dashboard was loaded, demonstrating inadequate output encoding that fails to neutralize these characters when rendered. Other factors also contributed, but the central issue lies in the absence of appropriate measures to sanitize inputs. These weaknesses collectively allow an attacker to inject and execute malicious scripts when the stored data is retrieved and displayed to users. This goes for both Stored XSS and Reflected XSS Cases. STORED XSS VERSUS REFLECTED XSS VULNERABILITIES Two common types of XSS vulnerabilities are Reflected XSS and Stored XSS. The main difference between them are their execution mechanisms. * Reflected XSS: This type of attack occurs when a malicious script is inserted into a URL and is immediately reflected back to the user, executing only for those who click the specifically crafted link. * Stored XSS: on the other hand, is when the malicious script is saved on the server and executed for any user viewing the affected page. The primary difference lies in the delivery: Reflected XSS targets individual requests, while Stored XSS is embedded in a web page and affects all users accessing it. HOW WE DISCOVERED 8 XSS VULNERABILITIES IN JUST A FEW DAYS Our initial encounter with XSS in Azure HDInsight was straightforward. We discovered that the Apache Ambari Background operations had multiple parameters that, by default, could be modified. After identifying this primary stored XSS vulnerability, we expanded our investigation. Using various techniques, we subsequently pinpointed seven more similar vulnerabilities. Leveraging hands-on manipulation combined with in-depth exploration of the text rendering engine, we were able to discover 8 XSS vulnerabilities in total, each of which required a unique approach to exploit. By promptly documenting and reporting these findings to MSRC, Microsoft was able to fix all the XSS vulnerabilities in their August 2023 security update. Click for sound 0:42 POC of how the XSS vulnerabilities could be exploited Utilizing BurpSuite, we were able to craft and send specially tailored requests to bypass the Apache Ambari dashboard’s native filters and sanitize problematic characters commonly known to prevent XSS. This involved encoding payloads and exploiting weak or misconfigured input validation, allowing us to manipulate user input in a manner that the server would process and render as part of the HTML. Through an automated software testing method known as fuzzing (Using the Intruder tool in Burpsuite), we systematically explored various permutations of both standard and non-standard XSS payloads, targeting different input fields and then observed how the application handled them. By careful inspection of HTTP responses and analyzing the Document Object Model (DOM), we were able to identify where the application was improperly escaping or sanitizing the user-supplied input. We traced the execution flow to uncover how the payloads were processed and manifested within the user’s browser. #1. AZURE HDINSIGHT/APACHE AMBARI STORED XSS IN BACKGROUND OPERATIONS The first XSS that we found in Azure HDInsight was in Apache Ambari Background operations, where we managed to modify default parameters by editing various values. Due to a special characters filter that was included in the dashboard, we weren’t able to modify the Background Operations parameters directly to a malicious XSS payload, but we got round this by first modifying them to a valid value, and then resending the request via Burpsuite. Workflow: 1. Create a new HDInsight Service on Azure Portal. 2. Select the Interactive Query cluster type and set the version. 3. Access the public endpoint of the service. Navigate to Services and select HDFS. 4. Click on the Run Service Check option in Background Operations. 5. Inspect the request made during this process. Modify the request to inject a simple HTML. 6. Observe that the injected code is reflected and rendered. 7. Proceed to inject a stored XSS payload which will be subsequently executed. #2. AZURE HDINSIGHT/APACHE AMBARI STORED XSS VIA MANAGED NOTIFICATION Stored XSS is found in the Managed Notifications component of Azure HDInsight’s Apache Ambari. The vulnerability occurs when manipulating alert notifications. Workflow: 1. Navigate to the dashboard and select Alerts. 2. Click on ACTIONS and then Managed Notifications. 3. Create a new email notification with a sample name. 4. Capture the request and inspect the returned status. 5. Attempt to inject an HTML payload when creating a new alert. 6. Upon deletion, a confirmation box displays the name of the alert. 7. Inject a stored XSS payload and observe it being executed. #3. AZURE HDINSIGHT/APACHE AMBARI STORED XSS IN YARN QUEUE MANAGER The YARN Queue Manager in Azure HDInsight’s Apache Ambari for the HBase cluster type is susceptible to a stored XSS. The vulnerability is present in the Access Control functions. Workflow: 1. Navigate to the dashboard and select the YARN Queue Manager view. 2. Select the root queue. 3. Navigate to the Access Control and Status sections. 4. Change the Administrator Queue to Custom and focus on Groups. 5. Observe the limitations in this field due to comma-separation. 6. Inject a simple HTML payload to verify the vulnerability. 7. Inject a crafted malicious XSS payload and save to see it being automatically executed. #4. AZURE HDINSIGHT/JUPYTER NOTEBOOKS CODE EXECUTION VIA STORED XSS Azure HDInsight’s Jupyter Notebook service is vulnerable to a stored XSS which can be further exploited to achieve remote code execution. The vulnerability stems from bypassing the Caja compiler. Workflow: 1. Set up the Spark cluster and navigate to the Jupyter Notebook service. 2. Create a new PySpark3 Notebook and test with sample code. 3. Examine the actions, requests, and WebSocket communications triggered during execution. 4. Test the Markdown feature in Jupyter and observe how the Caja compiler sanitizes JS code. 5. Use a specific method to bypass the Caja sanitization process. 6. Craft a malicious payload with a remote JS file evil.js. 7. The evil.js file establishes a WebSocket communication and sends a reverse shell as a code payload. 8. Set up a remote server to host the evil.js file and wait for an incoming reverse shell. #5. AZURE HDINSIGHT/APACHE HADOOP REFLECTED XSS VIA ENDPOINT MANIPULATION A reflected XSS vulnerability is present in Apache Hadoop’s ResourceManager UI within Azure HDInsight. By altering the container endpoint and port, an XSS can be executed. Workflow: 1. Access YARN from the dashboard inside the Hadoop Cluster. 2. Select Node and then the red-highlighted Node link. 3. Observe the container endpoint and port. 4. Alter the path by removing the host and port. 5. Change the entire path, observing the DNS callback for the default port (30060). 6. Set up a Python server to listen on port 30060. 7. Observe the execution of the XSS. #6. AZURE HDINSIGHT/APACHE HIVE 2 REFLECTED XSS VIA ENDPOINT MANIPULATION Apache Hive 2 within Azure HDInsight suffers from a reflected XSS vulnerability. By modifying the container endpoint and hosting a malicious file, an XSS can be executed. Workflow: 1. Click on the Public Endpoint after creating the HDInsight service. 2. Access Hive Service from the dashboard. 3. Click on Hive Interactive UI to see Running Instances. 4. Click on the Container ID to view the container endpoint and port. 5. Modify the Host (port cannot be changed) to point to your Collaborator. 6. Set up a Python server to listen on port 15002. 7. Host an xss.html file on the Python server. 8. Modify the URL to execute the malicious file, executing the XSS. #7. AZURE HDINSIGHT/APACHE AMBARI STORED XSS IN YARN CONFIGURATIONS A stored XSS vulnerability resides within Apache Ambari’s YARN Queue Manager in Azure HDInsight. By injecting JS code into specific YARN configurations, a stored XSS is executed upon refreshing the queues. Workflow: 1. Access YARN Queue Manager. 2. Set Node Locality Delay to 2 and click Save and Refresh Queues. 3. Review the modifications in Burp. 4. Experiment with different variables to find the injectable one (yarn.scheduler.capacity.resource-calculator). 5. Modify the value and send a saveAndRefresh request. 6. Refresh the queues; the next visit to the page will execute the Stored XSS. #8. AZURE HDINSIGHT/APACHE OOZIE WEB CONSOLE STORED XSS VIA CUSTOM FILTER The Apache Oozie Web Console in Azure HDInsight allows stored XSS via custom filter manipulation. By injecting HTML and then JS XSS payloads, a stored XSS can be set up to execute repeatedly. Workflow: 1. Access the Dashboard and select Oozie. 2. Click on the relevant Active Oozie Web UI. 3. Navigate to Custom filter. 4. Click on the Custom Filter Button. 5. Test HTML injection using an H1 tag. 6. Refresh the page, and validate that the tag is rendered. 7. Move to a JS XSS payload, and inject it. 8. Observe the payload being executed. 9. From this point, the payload will execute as a Stored XSS. HOW CAN ORGANIZATIONS REDUCE EXPOSURE TO XSS VULNERABILITIES? Even though these XSS vulnerabilities have now been fixed by Microsoft, it’s still important to implement robust security practices to minimize the risk of further XSS vulnerabilities. Below we list our recommendations to protect against XSS: 1. Input Validation: Validate user inputs against expected formats, data types, and ranges. This mitigates the risk of script injection. 2. Output Encoding: Use output encoding (HTML, JavaScript, and URL encoding) to ensure that user-generated data is properly sanitized before being displayed in web pages. 3. Content Security Policy (CSP): Implement CSP to add an extra layer of security that can restrict the execution of scripts and minimize the potential impact of any XSS vulnerabilities. 4. Use Frameworks and Libraries: Utilize modern web frameworks and libraries that incorporate security features by default. These frameworks often include mechanisms to prevent XSS vulnerabilities, such as automatic output encoding. 5. Apply the principle of least privilege: By giving users and processes only the permissions required for their specific tasks, you limit the potential attack surface for an attacker to exploit. This means that even if an attacker manages to inject malicious scripts through an XSS vulnerability, they will have limited access to sensitive data and functionality due to the principle of least privilege. The Orca Platform helps security teams apply the least privilege principle across their accounts ABOUT ORCA SECURITY Orca’s agentless cloud security platform connects to your environment in minutes and provides full visibility of all your assets on AWS, Azure, Google Cloud, Kubernetes, and more. Orca detects, prioritizes, and helps remediate cloud risks across every layer of your cloud estate, including vulnerabilities, malware, misconfigurations, lateral movement risk, API risks, sensitive data at risk, weak and leaked passwords, and overly permissive identities. * * * * STAY IN THE LOOP Keep up to date with everything you need to know about cloud security and our latest research By submitting my email address you agree to the use of my personal data in accordance with Orca Security Privacy Policy. RELATED ARTICLES Blog HOW THREAT RESEARCH CAN INFORM YOUR ORGANIZATION’S CLOUD SECURITY STRATEGY Read now Blog ORCA’S AI-POWERED CLOUD ASSET SEARCH IS AS INTUITIVE AS ASKING A QUESTION Read now See Orca in action-> View a 10 minute recorded demo or sign up for a personalized one-on-one walk-through. * PLATFORM * CLOUD SECURITY PLATFORM * Platform * SideScanning™ Technology * Context-Aware Security * Built-in Compliance * Automation & Customization * TECHNOLOGY ECOSYSTEM * Amazon Web Services * Microsoft Azure * Google Cloud Platform * SOLUTIONS * BY SOLUTION * Malware Detection * Vulnerability Management * Sensitive Data Detection * Container and Kubernetes Security * Multi-Cloud Compliance and Security * Cloud Security Posture Management (CSPM) * CIEM * Cloud Workload Protection Platform (CWPP) * Cloud Detection and Response (CDR) * Shift Left Security * API Security * Data Security and Posture Management (DSPM) * BY INDUSTRY * Financial Services * Technology Services * Media & Entertainment * Healthcare * Retail * RESOURCES * * Library * Product Info * Podcast * Case Studies * Cloud Risk Encyclopedia * Blog * Events * COMPARISONS * Prisma Cloud Security 2022 * Qualys Cloud Agent * Twistlock Container Security * Redlock Palo Alto * Rapid7 InsightVM * Check Point CloudGuard Dome9 * COMPANY * * About * Partners * Reviews * Orca Research Pod * Careers * Newsroom * Media Kit * Contact * Support * Security Portal * Login * STAY IN TOUCH Get cloud security insights and the latest Orca news * * * * * * * * -------------------------------------------------------------------------------- ©2023 Orca Security. All rights reserved. * Privacy Policy * Terms of Use * Cookies Settings * Virtual Patent Marking * * * * By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Accept All Cookies Reject All Cookies Settings PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * TARGETING COOKIES * SOCIAL MEDIA COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All