CVE-2020-17515

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

06 Aug 2022, 03:50

Type Values Removed Values Added
References (MLIST) https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E - Issue Tracking, Mailing List, Vendor Advisory
References (MLIST) https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E - Issue Tracking, Mailing List, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/05/01/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/05/01/2 - Mailing List, Third Party Advisory

04 May 2021, 00:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E -

02 May 2021, 00:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/05/01/2 -

01 May 2021, 22:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E -

Information

Published : 2020-12-11 14:15

Updated : 2022-08-06 03:50


NVD link : CVE-2020-17515

Mitre link : CVE-2020-17515


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')