2.10.5
7 years ago
2 months ago
Known vulnerabilities in the apache-airflow package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File in the form of configuration variables belonging to other DAG author users. If these variables contain sensitive values, which is a fact out of the attacking user's control, they will be exposed. How to fix Insertion of Sensitive Information into Log File? Upgrade | [,2.10.3rc1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Uninitialized Memory Exposure which allows authenticated users with audit log access to see sensitive unencrypted stored values set via the airflow CLI. Note: Users who are using the CLI to set secret variables are advised to manually delete entries with those variables from the log table. How to fix Uninitialized Memory Exposure? Upgrade | [,2.10.3) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Execution with Unnecessary Privileges due to the ability of DAG authors to add local settings to the DAG folder which then gets executed by the scheduler. An attacker can escalate privileges and execute arbitrary code by manipulating the DAG configuration files. This vulnerability is can be exploited by an attacker with DAG author permissions. How to fix Execution with Unnecessary Privileges? Upgrade | [,2.10.1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Encoding or Escaping of Output through the How to fix Improper Encoding or Escaping of Output? Upgrade | [,2.10.1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the provider documentation link due to improper user input sanitization in the How to fix Cross-site Scripting (XSS)? Upgrade | [,2.10.0) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') that allows an authenticated attacker to inject a malicious link into the provider installation process. How to fix Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')? Upgrade | [,2.9.3) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') which allows an authenticated How to fix Improper Control of Generation of Code ('Code Injection')? Upgrade | [2.4.0,2.9.3) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Use of Web Browser Cache Containing Sensitive Information by not returning the How to fix Use of Web Browser Cache Containing Sensitive Information? Upgrade | [,2.9.2) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Certificate Validation for How to fix Improper Certificate Validation? Upgrade | [,2.9.0b1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Information Exposure via the Note: This is only exploitable if How to fix Information Exposure? Upgrade | [2.7.0,2.9.0) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Incorrect Default Permissions that allow Ops and Viewers users to view all information in audit logs, including DAG names and usernames they are not permitted to view. How to fix Incorrect Default Permissions? Upgrade | [,2.8.2rc1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Exposure of Resource to Wrong Sphere due to improper permission checks in the API and UI components. An attacker can view DAG code and import errors for DAGs they are not authorized to access by exploiting this vulnerability. How to fix Exposure of Resource to Wrong Sphere? Upgrade | [,2.8.2) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to improper validation of input during the deserialization process of XCom data. An attacker can execute arbitrary code by submitting crafted input that bypasses the protection of the How to fix Deserialization of Untrusted Data? Upgrade | [,2.8.1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Missing Authorization via the permission verification process. An attacker can read the source code of a DAG without having the proper permissions by exploiting this vulnerability. How to fix Missing Authorization? Upgrade | [,2.8.1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) that allows triggering a DAG in a GET request, by convincing a user who is authenticated to the Airflow UI to visit a malicious website in the same browser. How to fix Cross-site Request Forgery (CSRF)? Upgrade | [2.7.0,2.8.0) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Access Control allowing an authenticated user with limited access to some NOTE: This was thought to be fixed in version 2.7.2, with the publication of CVE-2023-42792, but it was missed. How to fix Improper Access Control? Upgrade | [,2.8.0b1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the parameter description field of a DAG. A DAG author can embed JavaScript, which can be executed on the client side when a user views the DAG details in the browser. This could lead to misleading information being displayed to the user. How to fix Cross-site Scripting (XSS)? Upgrade | [2.6.0,2.8.0b1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Access Control via the How to fix Improper Access Control? Upgrade | [,2.8.0b1) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Incorrect Authorization in This vulnerability is the same one described by CVE-2023-40611, which has now been fixed. How to fix Incorrect Authorization? Upgrade | [,2.7.3) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Access Control in handling task instances. A user can read information about task instances in other DAGs. How to fix Improper Access Control? Upgrade | [,2.7.3) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Information Exposure allowing an authenticated user to retrieve sensitive configuration information when the Note:
The How to fix Information Exposure? Upgrade | [2.7.0,2.7.2) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Access Control allowing authenticated users to list warnings for all DAGs, even if the user had no permission reveal the How to fix Improper Access Control? Upgrade | [,2.7.2) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Improper Access Control allowing an authenticated user with limited access to some NOTE: This was thought to be fixed in version 2.7.2, but was missed and later addressed with the publication of CVE-2023-48291. How to fix Improper Access Control? Upgrade | [,2.7.2) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Information Exposure due to the improper access control mechanism, an authorized user with read access to specific Directed Acyclic Graphs (DAGs) can access information about task instances in other DAGs. Note: This is only exploitable if the user has been granted read access to specific DAGs. How to fix Information Exposure? Upgrade | [,2.7.2) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Incorrect Authorization in NOTE: This vulnerability was originally marked as fixed in 2.7.1 but the fix did not make it into that version. It was subsequently fixed in 2.7.3 and also assigned CVE-2023-47037. How to fix Incorrect Authorization? Upgrade | [,2.7.3) |
apache-airflow is a platform to programmatically author, schedule, and monitor workflows. Affected versions of this package are vulnerable to Information Exposure in a rendered template generated with How to fix Information Exposure? Upgrade | [,2.7.1) |