First published: Wed Apr 10 2019(Updated: )
A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have adequate protection and were vulnerable to cross-site request forgery attacks.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-airflow | <1.10.3 | 1.10.3 |
Apache Airflow | <=1.10.2 | |
<=1.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0229 is considered to have a medium severity rating due to its cross-site request forgery vulnerabilities.
To fix CVE-2019-0229, upgrade Apache Airflow to version 1.10.3 or later.
Apache Airflow versions up to and including 1.10.2 are affected by CVE-2019-0229.
CVE-2019-0229 facilitates cross-site request forgery (CSRF) attacks due to inadequate protection on HTTP endpoints.
Yes, CVE-2019-0229 is directly related to web application security concerning the protection of webserver endpoints.