CVE-2021-35936
- EPSS 1.9%
- Veröffentlicht 16.08.2021 08:15:11
- Zuletzt bearbeitet 21.11.2024 06:12:47
If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no...
CVE-2021-29621
- EPSS 0.43%
- Veröffentlicht 07.06.2021 19:15:07
- Zuletzt bearbeitet 07.03.2025 14:37:51
Flask-AppBuilder is a development framework, built on top of Flask. User enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the serv...
CVE-2021-28359
- EPSS 4.16%
- Veröffentlicht 02.05.2021 08:15:06
- Zuletzt bearbeitet 21.11.2024 05:59:35
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & C...
CVE-2021-26559
- EPSS 0.56%
- Veröffentlicht 17.02.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:56:28
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `ai...
CVE-2021-26697
- EPSS 2.46%
- Veröffentlicht 17.02.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:56:41
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters ...
CVE-2020-17526
- EPSS 91.17%
- Veröffentlicht 21.12.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:08:17
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from S...
CVE-2020-17511
- EPSS 0.11%
- Veröffentlicht 14.12.2020 10:15:12
- Zuletzt bearbeitet 21.11.2024 05:08:15
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.
CVE-2020-17513
- EPSS 2.14%
- Veröffentlicht 14.12.2020 10:15:12
- Zuletzt bearbeitet 21.11.2024 05:08:15
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.
CVE-2020-17515
- EPSS 10.19%
- Veröffentlicht 11.12.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 05:08:15
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix t...
CVE-2020-13927
- EPSS 94.1%
- Veröffentlicht 10.11.2020 16:15:11
- Zuletzt bearbeitet 23.10.2025 14:51:33
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by def...