[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2023-47265: Apache Airflow: DAG Params alllow to embed unchecked Javascript
From: Ephraim Anierobi <ephraimanierobi () apache ! org>
Date: 2023-12-21 7:04:46
Message-ID: f229a045-e964-c47f-8f69-9d6178032408 () apache ! org
[Download RAW message or body]
Severity: low
Affected versions:
- Apache Airflow 2.6.0 before 2.8.0
Description:
Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a DAG \
author to add an unbounded and not-sanitized javascript in the parameter description field of \
the DAG. This Javascript can be executed on the client side of any of the user who looks at \
the tasks in the browser sandbox. While this issue does not allow to exit the browser sandbox \
or manipulation of the server-side data - more than the DAG author already has, it allows to \
modify what the user looking at the DAG details sees in the browser - which opens up all kinds \
of possibilities of misleading other users.
Users of Apache Airflow are recommended to upgrade to version 2.8.0 or newer to mitigate the \
risk associated with this vulnerability
Credit:
Jens Scheffler (finder)
Andrey Anshin (finder)
Jens Scheffler (remediation developer)
References:
https://github.com/apache/airflow/pull/35460
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-47265
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic