Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on the web server and theĀ user to click the provider link.
Users should upgrade to 2.10.0 or later, which fixes this vulnerability.
References
Link | Resource |
---|---|
https://github.com/apache/airflow/pull/40933 | Patch |
https://lists.apache.org/thread/lwlmgg6hqfmkpvw5py4w53hxyl37jl6d | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/08/21/3 |
Configurations
History
No history.
Information
Published : 2024-08-21 16:15
Updated : 2025-03-20 21:15
NVD link : CVE-2024-41937
Mitre link : CVE-2024-41937
CVE.ORG link : CVE-2024-41937
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')