[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2023-47265: Apache Airflow: DAG Params alllow to embed unchecked Javascript
From:       Ephraim Anierobi <ephraimanierobi () apache ! org>
Date:       2023-12-21 7:04:46
Message-ID: f229a045-e964-c47f-8f69-9d6178032408 () apache ! org
[Download RAW message or body]

Severity: low

Affected versions:

- Apache Airflow 2.6.0 before 2.8.0

Description:

Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a DAG \
author to add an unbounded and not-sanitized javascript in the parameter description field of \
the DAG.  This Javascript can be executed on the client side of any of the user who looks at \
the tasks in the browser sandbox. While this issue does not allow to exit the browser sandbox \
or manipulation of the server-side data - more than the DAG author already has, it allows to \
modify what the user looking at the DAG details sees in the browser - which opens up all kinds \
of possibilities of misleading other users.

Users of Apache Airflow are recommended to upgrade to version 2.8.0 or newer to mitigate the \
risk associated with this vulnerability

Credit:

Jens Scheffler (finder)
Andrey Anshin (finder)
Jens Scheffler (remediation developer)

References:

https://github.com/apache/airflow/pull/35460
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-47265


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic