Page 5 of 71 results (0.005 seconds)

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

07 Oct 2022 — In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API. En Apache Airflow, versiones anteriores a 2.4.1, desactivar un usuario no impedía que un usuario ya autenticado pudiera seguir usando la Interfaz de Usuario o la API • https://github.com/apache/airflow/pull/26635 • CWE-613: Insufficient Session Expiration •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

21 Sep 2022 — In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint. En Apache Airflow versiones 2.3.0 hasta 2.3.4, se presentaba un redireccionamiento abierto en el endpoint "/confirm" del servidor web • https://github.com/apache/airflow/pull/26409 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

21 Sep 2022 — In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction. En Apache Airflow versiones 2.3.0 hasta 2.3.4, parte de una url tenía un formato no necesario que permitía una posible extracción de información • https://github.com/apache/airflow/pull/26337 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

02 Sep 2022 — In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation. En Apache Airflow versiones 2.2.4 hasta 2.3.3, el backend de sesión del servidor web "database" era susceptible a una fijación de sesión • http://www.openwall.com/lists/oss-security/2022/09/02/1 • CWE-384: Session Fixation •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

02 Sep 2022 — In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver. En Apache Airflow versiones anteriores a 2.3.4, era configurado una máscara de usuario no segura para numerosos componentes de Airflow cuando es ejecutado con el flag "--daemon", lo que podía resultar... • http://www.openwall.com/lists/oss-security/2022/09/02/12 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.8EPSS: 92%CPEs: 1EXPL: 0

25 Feb 2022 — In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI. En Apache Airflow, versiones anteriores a 2.2.4, algunos DAG de ejemplo no saneaban correctamente los parámetros proporcionados por el usuario, lo que los hacía susceptibles a inyección de comandos del Sistema Operativo desde la interfaz web. • https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.1EPSS: 3%CPEs: 1EXPL: 0

25 Feb 2022 — It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below. Se ha detectado que la pantalla "Trigger DAG with config" era susceptible de ataques de tipo XSS por medio del argumento de consulta "origin". Este problema afecta a Apache Airflow versiones 2.2.3 y anteriores. • https://lists.apache.org/thread/phx76cgtmhwwdy780rvwhobx8qoy4bnk • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 2%CPEs: 2EXPL: 0

20 Jan 2022 — In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for. En Apache Airflow versiones anteriores a 2.2.0. Esta CVE es aplicada a un caso específico en el que un usuario que presenta permisos "can_create" en las ejecuciones DAG puede crear ejecuciones Dag para dags para los que no presenta permisos "edit" • https://lists.apache.org/thread/m778ojn0k595rwco4ht9wjql89mjoxnl •

CVSS: 9.8EPSS: 91%CPEs: 1EXPL: 1

09 Sep 2021 — The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3. El endpoint de importación de variables no estaba protegido por autenticación en Airflow versiones posteriores a 2.0.0 incluyéndola, versiones anteriores a 2.1.3. Esto per... • https://github.com/Captain-v-hook/PoC-for-CVE-2021-38540- • CWE-269: Improper Privilege Management CWE-306: Missing Authentication for Critical Function •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

16 Aug 2021 — If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2. Si no es usado el registro remoto, el trabajador (en el caso de CeleryExecutor) o el planificador (en el caso de LocalExecutor) ejecuta un servidor de registro F... • https://lists.apache.org/thread.html/r53d6bd7b0a66f92ddaf1313282f10fec802e71246606dd30c16536df%40%3Cusers.airflow.apache.org%3E • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •