In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. The new "RBAC" UI is unaffected.
References
Configurations
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2020/01/14/2 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b%40%3Cdev.airflow.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b%40%3Cusers.airflow.apache.org%3E - Mailing List, Vendor Advisory |
07 Nov 2023, 03:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-01-14 17:15
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12398
Mitre link : CVE-2019-12398
CVE.ORG link : CVE-2019-12398
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')