Apache

Airflow

97 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.37%
  • Veröffentlicht 02.11.2022 12:15:56
  • Zuletzt bearbeitet 02.05.2025 21:15:23

In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint.

  • EPSS 3.89%
  • Veröffentlicht 02.11.2022 12:15:56
  • Zuletzt bearbeitet 02.05.2025 21:15:23

In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument.

  • EPSS 0.34%
  • Veröffentlicht 07.10.2022 07:15:08
  • Zuletzt bearbeitet 21.11.2024 07:23:36

In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API.

  • EPSS 2.17%
  • Veröffentlicht 21.09.2022 08:15:08
  • Zuletzt bearbeitet 27.05.2025 19:15:23

In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint.

  • EPSS 2.1%
  • Veröffentlicht 21.09.2022 08:15:08
  • Zuletzt bearbeitet 27.05.2025 19:15:23

In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction.

  • EPSS 0.29%
  • Veröffentlicht 02.09.2022 07:15:07
  • Zuletzt bearbeitet 21.11.2024 07:15:55

In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing loc...

  • EPSS 1.98%
  • Veröffentlicht 02.09.2022 07:15:07
  • Zuletzt bearbeitet 21.11.2024 07:15:39

In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation.

  • EPSS 90.13%
  • Veröffentlicht 25.02.2022 09:15:06
  • Zuletzt bearbeitet 21.11.2024 06:50:05

In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.

  • EPSS 1.56%
  • Veröffentlicht 25.02.2022 09:15:06
  • Zuletzt bearbeitet 21.11.2024 06:32:00

It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below.

  • EPSS 1.32%
  • Veröffentlicht 20.01.2022 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:32:01

In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for.