First published: Thu Sep 17 2020(Updated: )
In Apache Airflow < 1.10.12, the "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <1.10.15 | |
Apache Airflow | >=2.0.0<2.0.2 | |
pip/apache-airflow | <1.10.12 | 1.10.12 |
<1.10.15 | ||
>=2.0.0<2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Apache Airflow CVE-2020-13944 is a vulnerability in Apache Airflow versions prior to 1.10.12 that allows for cross-site scripting (XSS) exploits through the 'origin' parameter in certain endpoints.
Apache Airflow CVE-2020-13944 has a severity score of 6.1 (Medium).
Apache Airflow versions prior to 1.10.12 are affected by CVE-2020-13944, as well as versions 2.0.0 to 2.0.2.
To fix Apache Airflow CVE-2020-13944, it is recommended to upgrade to version 1.10.12 or newer if using versions prior to 1.10.12, or upgrade to version 2.0.3 or newer if using versions 2.0.0 to 2.0.2.
More information about Apache Airflow CVE-2020-13944 can be found in the references provided: [Reference 1](http://www.openwall.com/lists/oss-security/2020/12/11/2), [Reference 2](http://www.openwall.com/lists/oss-security/2021/05/01/2), [Reference 3](https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E).