6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
68.3%
In Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver’s /login
endpoint.
my initial email to [email protected]
:
Hi,
In Apache Airflow, there is a parameter "next" on the Login page. And after a successful login, we're redirected to this parameter's value.
I see there are some preventions for the open redirect bug. However, I can bypass these preventions using "/\google.com"
It seems this parameter accepts anything after the slash "/" character. And, browsers parse "/\" as "http://" in the location header.
For reproducing, you can try to login on the http://127.0.0.1:8080/login/?next=/\google.com
I tested this bug in the last version (v2.4.2)
Regards,
Bugra Eskici
Here is the email thread:
{█████████}
Unvalidated URL redirection during login, can be used for phishing, etc.
Regards,
Bugra
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
68.3%