Page 13 of 77 results (0.010 seconds)

CVSS: 9.8EPSS: 96%CPEs: 1EXPL: 3

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default La configuración predeterminada previa para Airflow's Experimental API permitió todas las peticiones de la API sin autenticación, pero esto plantea riesgos de seguridad para los usuarios que no se dan cuenta de este hecho. Desde Airflow versión 1.10.11, el valor predeterminado ha sido cambiado para denegar todas las peticiones por defecto y está documentado en https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Tome en cuenta que este cambio lo corrige para nuevas instalaciones, pero los usuarios existentes deben cambiar su configuración a la predeterminada "[api] auth_backend=airflow.api.auth.backend.deny_all" como es mencionado en la Guía de Actualización: https://github.com/apache /airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-defaul Apache Airflow versions 1.10.10 and below suffer from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/49927 http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E • CWE-306: Missing Authentication for Critical Function CWE-1056: Invokable Control Element with Variadic Parameters CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

In Apache Airflow < 1.10.12, the "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. En Apache Airflow versiones anteriores a 1.10.12, el parámetro "origin" pasado a algunos de los endpoints como "/trigger" era vulnerable a una explotación de un XSS • http://www.openwall.com/lists/oss-security/2020/12/11/2 http://www.openwall.com/lists/oss-security/2021/05/01/2 https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a%40%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a%40%3Cdev.airflow.apache.org%3E https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a%40%3Cusers.airflow.apache.org%3E https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerability was discovered in the Chart pages of the the "classic" UI. Se encontró un problema en Apache Airflow versiones 1.10.10 y posteriores. Se detectó una vulnerabilidad de tipo XSS almacenado en las páginas de Chart de la IU "classic" • https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks. Se encontró un problema en Apache Airflow versiones 1.10.10 y posteriores. Se detectó que muchas de las pantallas de gestión de administración en la UI new/RBAC manejaban el escape incorrectamente, permitiendo a usuarios autenticados con los permisos apropiados crear ataques de tipo XSS almacenado • https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker. Se encontró un problema en Apache Airflow versiones 1.10.10 y posteriores. Cuando se usa la función CeleryExecutor, si un ataque puede conectarse directamente al broker (Redis, RabbitMQ), era posible insertar una carga maliciosa directamente al agente que podría conllevar a un ataque de deserialización (y, por lo tanto, a un ejecución de código remota) en el Worker • https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E • CWE-502: Deserialization of Untrusted Data •