
CVE-2022-27949 – Apache Airflow prior to 2.3.1 may include sensitive values in rendered template
https://notcve.org/view.php?id=CVE-2022-27949
14 Nov 2022 — A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in rendered template values for tasks which were not executed (for example when they were depending on past and previous instances of the task failed). This issue affects Apache Airflow prior to 2.3.1. Una vulnerabilidad en la interfaz de usuario de Apache Airflow permite a un atacante ver secretos desenmascarados en valores de plantilla representados para tareas que no se ejecutaron (por ejemplo, cuando dependían de instanc... • http://www.openwall.com/lists/oss-security/2022/11/14/3 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2022-40127 – Apache Airflow <2.4.0 has an RCE in a bash example
https://notcve.org/view.php?id=CVE-2022-40127
14 Nov 2022 — A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0. Una vulnerabilidad en Dags de ejemplo de Apache Airflow permite a un atacante con acceso a la interfaz de usuario que puede activar DAG ejecutar comandos arbitrarios a través del parámetro run_id proporcionado manualmente. Este problema afecta a las versiones de... • https://github.com/Mr-xn/CVE-2022-40127 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2022-43982 – Apache Airflow prior to 2.4.2 allows reflected XSS via Origin Query Argument in URL
https://notcve.org/view.php?id=CVE-2022-43982
02 Nov 2022 — In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. En las versiones de Apache Airflow anteriores a la 2.4.2, la pantalla "Trigger DAG with config" era susceptible a ataques XSS a través del argumento de consulta "origin". • https://github.com/apache/airflow/pull/27143 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-43985 – Apache Airflow prior to 2.4.2 has an open redirect
https://notcve.org/view.php?id=CVE-2022-43985
02 Nov 2022 — In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint. En las versiones de Apache Airflow anteriores a la 2.4.2, había una redirección abierta en el punto final `/confirm` del servidor web. • https://github.com/apache/airflow/pull/27143 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2022-41672 – Session still functional after user is deactivated
https://notcve.org/view.php?id=CVE-2022-41672
07 Oct 2022 — In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API. En Apache Airflow, versiones anteriores a 2.4.1, desactivar un usuario no impedía que un usuario ya autenticado pudiera seguir usando la Interfaz de Usuario o la API • https://github.com/apache/airflow/pull/26635 • CWE-613: Insufficient Session Expiration •

CVE-2022-38170 – Overly permissive umask for daemons
https://notcve.org/view.php?id=CVE-2022-38170
02 Sep 2022 — In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver. En Apache Airflow versiones anteriores a 2.3.4, era configurado una máscara de usuario no segura para numerosos componentes de Airflow cuando es ejecutado con el flag "--daemon", lo que podía resultar... • http://www.openwall.com/lists/oss-security/2022/09/02/12 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2022-24288 – Apache Airflow: RCE in example DAGs
https://notcve.org/view.php?id=CVE-2022-24288
25 Feb 2022 — In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI. En Apache Airflow, versiones anteriores a 2.2.4, algunos DAG de ejemplo no saneaban correctamente los parámetros proporcionados por el usuario, lo que los hacía susceptibles a inyección de comandos del Sistema Operativo desde la interfaz web. • https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2021-45229 – Apache Airflow: Reflected XSS via Origin Query Argument in URL
https://notcve.org/view.php?id=CVE-2021-45229
25 Feb 2022 — It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below. Se ha detectado que la pantalla "Trigger DAG with config" era susceptible de ataques de tipo XSS por medio del argumento de consulta "origin". Este problema afecta a Apache Airflow versiones 2.2.3 y anteriores. • https://lists.apache.org/thread/phx76cgtmhwwdy780rvwhobx8qoy4bnk • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-35936 – No Authentication on Logging Server
https://notcve.org/view.php?id=CVE-2021-35936
16 Aug 2021 — If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2. Si no es usado el registro remoto, el trabajador (en el caso de CeleryExecutor) o el planificador (en el caso de LocalExecutor) ejecuta un servidor de registro F... • https://lists.apache.org/thread.html/r53d6bd7b0a66f92ddaf1313282f10fec802e71246606dd30c16536df%40%3Cusers.airflow.apache.org%3E • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •

CVE-2021-28359 – Apache Airflow Reflected XSS via Origin Query Argument in URL
https://notcve.org/view.php?id=CVE-2021-28359
02 May 2021 — The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are ... • https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •