First published: Wed Feb 27 2019(Updated: )
In Apache Airflow before 1.10.2, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <1.10.2 | |
pip/apache-airflow | <1.10.2 | 1.10.2 |
<1.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20244 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution via JavaScript.
To fix CVE-2018-20244, you should upgrade Apache Airflow to version 1.10.2 or later.
CVE-2018-20244 allows malicious admin users to manipulate the Airflow metadata database to execute arbitrary JavaScript.
CVE-2018-20244 affects Apache Airflow versions prior to 1.10.2.
No, only a malicious admin user with access to the Airflow metadata database can exploit CVE-2018-20244.