Untriaged
Permalink
CVE-2024-32077
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Apache Airflow: XSS vulnerability in Task Instance Log/Log Details
Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs. Users are recommended to upgrade to version 2.9.1, which fixes this issue.
References
-
https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 vendor-advisory
-
-
-
http://www.openwall.com/lists/oss-security/2024/05/14/1 x_transferred
-
https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 vendor-advisory
-
https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 vendor-advisory
-
https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 vendor-advisory
-
-
-
http://www.openwall.com/lists/oss-security/2024/05/14/1 x_transferred
-
https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 vendor-advisory
-
-
-
http://www.openwall.com/lists/oss-security/2024/05/14/1 x_transferred
-
https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 vendor-advisory
-
-
-
http://www.openwall.com/lists/oss-security/2024/05/14/1 x_transferred
Affected products
airflow
- ==2.9.0
apache-airflow
- <2.9.1
Matching in nixpkgs
pkgs.apache-airflow
Programmatically author, schedule and monitor data pipelines
Package maintainers
-
@ingenieroariel Ariel Nunez <ariel@nunez.co>
-
@gbpdt Graham Bennett <nix@pdtpartners.com>
-
@bhipple Benjamin Hipple <bhipple@protonmail.com>