CVE-2022-40127 – Apache Airflow <2.4.0 has an RCE in a bash example
https://notcve.org/view.php?id=CVE-2022-40127
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0. Una vulnerabilidad en Dags de ejemplo de Apache Airflow permite a un atacante con acceso a la interfaz de usuario que puede activar DAG ejecutar comandos arbitrarios a través del parámetro run_id proporcionado manualmente. Este problema afecta a las versiones de Apache Airflow Apache Airflow anteriores a la 2.4.0. • https://github.com/Mr-xn/CVE-2022-40127 https://github.com/jakabakos/CVE-2022-40127-Airflow-RCE http://www.openwall.com/lists/oss-security/2022/11/14/2 https://github.com/apache/airflow/pull/25960 https://lists.apache.org/thread/cf132hgm6jvzvsbpsozl3plf1r4cwysy • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2022-43982 – Apache Airflow prior to 2.4.2 allows reflected XSS via Origin Query Argument in URL
https://notcve.org/view.php?id=CVE-2022-43982
In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. En las versiones de Apache Airflow anteriores a la 2.4.2, la pantalla "Trigger DAG with config" era susceptible a ataques XSS a través del argumento de consulta "origin". • https://github.com/apache/airflow/pull/27143 https://lists.apache.org/thread/vqnvdrfsw9z7v7c46qh3psjgr7wy959l • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-43985 – Apache Airflow prior to 2.4.2 has an open redirect
https://notcve.org/view.php?id=CVE-2022-43985
In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint. En las versiones de Apache Airflow anteriores a la 2.4.2, había una redirección abierta en el punto final `/confirm` del servidor web. • https://github.com/apache/airflow/pull/27143 https://lists.apache.org/thread/m13y9s5kw92fw9l8j4qd85h0txp4kfcq • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2022-41672 – Session still functional after user is deactivated
https://notcve.org/view.php?id=CVE-2022-41672
In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API. En Apache Airflow, versiones anteriores a 2.4.1, desactivar un usuario no impedía que un usuario ya autenticado pudiera seguir usando la Interfaz de Usuario o la API • https://github.com/apache/airflow/pull/26635 https://lists.apache.org/thread/ohf3pvd3dftb8zb01yngbn1jtkq5m08y • CWE-613: Insufficient Session Expiration •
CVE-2022-40754 – Open Redirect
https://notcve.org/view.php?id=CVE-2022-40754
In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint. En Apache Airflow versiones 2.3.0 hasta 2.3.4, se presentaba un redireccionamiento abierto en el endpoint "/confirm" del servidor web • https://github.com/apache/airflow/pull/26409 https://lists.apache.org/thread/cn098dcp5x3c402xrb06p3l7nz5goffm • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •