Untriaged
Permalink
CVE-2024-41937
6.1 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Apache Airflow: Stored XSS Vulnerability on provider link
Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on the web server and the user to click the provider link. Users should upgrade to 2.10.0 or later, which fixes this vulnerability.
References
-
https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d vendor-advisory
-
https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d vendor-advisory
-
https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d vendor-advisory
-
https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d vendor-advisory
Affected products
apache-airflow
- <2.10.0
Matching in nixpkgs
pkgs.apache-airflow
Programmatically author, schedule and monitor data pipelines
Package maintainers
-
@ingenieroariel Ariel Nunez <ariel@nunez.co>
-
@gbpdt Graham Bennett <nix@pdtpartners.com>
-
@bhipple Benjamin Hipple <bhipple@protonmail.com>