First published: Wed Jan 23 2019(Updated: )
In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-airflow | <=1.8.2 | 1.9.0 |
<=1.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17836 is classified as a moderate severity vulnerability due to its potential for credential exfiltration.
To mitigate CVE-2017-17836, upgrade Apache Airflow to version 1.9.0 or later.
An attacker could exploit CVE-2017-17836 to exfiltrate authenticated cookies and database passwords if they gain limited access to the Airflow system.
CVE-2017-17836 affects Apache Airflow versions 1.8.2 and earlier.
Yes, CVE-2017-17836 can be exploited through XSS or by accessing an unlocked machine.