CVE-2021-38540
- EPSS 90.04%
- Veröffentlicht 09.09.2021 15:15:09
- Zuletzt bearbeitet 21.11.2024 06:17:23
The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, informati...
CVE-2021-35936
- EPSS 1.4%
- Veröffentlicht 16.08.2021 08:15:11
- Zuletzt bearbeitet 21.11.2024 06:12:47
If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no...
CVE-2021-29621
- EPSS 0.43%
- Veröffentlicht 07.06.2021 19:15:07
- Zuletzt bearbeitet 07.03.2025 14:37:51
Flask-AppBuilder is a development framework, built on top of Flask. User enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the serv...
CVE-2021-28359
- EPSS 4.16%
- Veröffentlicht 02.05.2021 08:15:06
- Zuletzt bearbeitet 21.11.2024 05:59:35
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & C...
CVE-2021-26697
- EPSS 2.46%
- Veröffentlicht 17.02.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:56:41
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters ...
CVE-2021-26559
- EPSS 0.56%
- Veröffentlicht 17.02.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:56:28
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `ai...
CVE-2020-17526
- EPSS 91.17%
- Veröffentlicht 21.12.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:08:17
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from S...
CVE-2020-17513
- EPSS 2.14%
- Veröffentlicht 14.12.2020 10:15:12
- Zuletzt bearbeitet 21.11.2024 05:08:15
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.
CVE-2020-17511
- EPSS 0.11%
- Veröffentlicht 14.12.2020 10:15:12
- Zuletzt bearbeitet 21.11.2024 05:08:15
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.
CVE-2020-17515
- EPSS 10.19%
- Veröffentlicht 11.12.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 05:08:15
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix t...