6.1 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Apache Airflow: Stored XSS Vulnerability on provider link
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on the web server and the user to click the provider link. Users should upgrade to 2.10.0 or later, which fixes this vulnerability.
References
- https://github.com/apache/airflow/pull/40933 patch
- https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d vendor-advisory
- http://www.openwall.com/lists/oss-security/2024/08/21/3
- https://github.com/apache/airflow/pull/40933 patch
- https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d vendor-advisory
- http://www.openwall.com/lists/oss-security/2024/08/21/3
- https://github.com/apache/airflow/pull/40933 patch
- https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d vendor-advisory
- http://www.openwall.com/lists/oss-security/2024/08/21/3
Affected products
- <2.10.0
Matching in nixpkgs
pkgs.apache-airflow
Programmatically author, schedule and monitor data pipelines
-
nixos-unstable -
- nixpkgs-unstable 2.7.3
Package maintainers
-
@bhipple Benjamin Hipple <bhipple@protonmail.com>
-
@ingenieroariel Ariel Nunez <ariel@nunez.co>
-
@gbpdt Graham Bennett <nix@pdtpartners.com>