Apache

Airflow

97 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 90.04%
  • Veröffentlicht 09.09.2021 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:17:23

The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, informati...

  • EPSS 1.4%
  • Veröffentlicht 16.08.2021 08:15:11
  • Zuletzt bearbeitet 21.11.2024 06:12:47

If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no...

  • EPSS 0.43%
  • Veröffentlicht 07.06.2021 19:15:07
  • Zuletzt bearbeitet 07.03.2025 14:37:51

Flask-AppBuilder is a development framework, built on top of Flask. User enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the serv...

  • EPSS 4.16%
  • Veröffentlicht 02.05.2021 08:15:06
  • Zuletzt bearbeitet 21.11.2024 05:59:35

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & C...

  • EPSS 2.46%
  • Veröffentlicht 17.02.2021 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:56:41

The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters ...

  • EPSS 0.56%
  • Veröffentlicht 17.02.2021 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:56:28

Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `ai...

  • EPSS 91.17%
  • Veröffentlicht 21.12.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:08:17

Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from S...

  • EPSS 2.14%
  • Veröffentlicht 14.12.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:08:15

In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.

  • EPSS 0.11%
  • Veröffentlicht 14.12.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:08:15

In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.

  • EPSS 10.19%
  • Veröffentlicht 11.12.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:08:15

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix t...