Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on the web server and the user to click the provider link.
Users should upgrade to 2.10.0 or later, which fixes this vulnerability.
References
Link | Resource |
---|---|
https://github.com/apache/airflow/pull/40933 | Patch |
https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d | Third Party Advisory |
Configurations
History
23 Aug 2024, 16:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/apache/airflow/pull/40933 - Patch | |
References | () https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d - Third Party Advisory | |
CPE | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Apache
Apache airflow |
21 Aug 2024, 17:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-21 16:15
Updated : 2024-08-23 16:21
NVD link : CVE-2024-41937
Mitre link : CVE-2024-41937
CVE.ORG link : CVE-2024-41937
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')