First published: Wed Nov 02 2022(Updated: )
In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.4.2 | |
pip/apache-airflow | <2.4.2rc1 | 2.4.2rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43982 is a vulnerability in Apache Airflow versions prior to 2.4.2 that allows XSS attacks via the 'origin' query argument.
CVE-2022-43982 has a severity rating of medium with a CVSS score of 6.1.
CVE-2022-43982 affects Apache Airflow versions prior to 2.4.2.
To fix CVE-2022-43982, you should upgrade Apache Airflow to version 2.4.2 or newer.
You can find more information about CVE-2022-43982 on the GitHub pull request (https://github.com/apache/airflow/pull/27143) and Apache mailing list (https://lists.apache.org/thread/vqnvdrfsw9z7v7c46qh3psjgr7wy959l).