Lucene search

K
githubGitHub Advisory DatabaseGHSA-5RP4-749P-VX26
HistorySep 22, 2022 - 10:40 p.m.

Apache Airflow vulnerable to Use of Externally-Controlled Format String

2022-09-2222:40:27
CWE-134
GitHub Advisory Database
github.com
11
apache
airflow
vulnerability
format string
information extraction
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.5%

In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction.

Affected configurations

Vulners
Node
apacheairflowRange<2.4.0b1

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.5%

Related for GHSA-5RP4-749P-VX26