Lucene search

K
hackeroneSw0rd1ightH1:2677187
HistoryAug 22, 2024 - 3:20 p.m.

Internet Bug Bounty: CVE-2024-41937: Apache Airflow: Stored XSS Vulnerability on provider link

2024-08-2215:20:22
sw0rd1ight
hackerone.com
$497
13
apache airflow
stored xss
vulnerability
upgrade
bug bounty
cross-site scripting
cve-2024-41937
impact

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High

Apache Airflow, versions before 2.10.0, have a vulnerability that allows the developer of a malicious provider to execute a cross-site scripting attack when clicking on a provider documentation link. This would require the provider to be installed on the web server and the user to click the provider link.
Users should upgrade to 2.10.0 or later, which fixes this vulnerability.

I reported this vulnerability through the official Apache Airflow security email on July 21, 2024, and received a fix along with a CVE number on August 21, 2024.
this is screenshot of email and ASF response email I submitted
ā–ˆā–ˆā–ˆ
ā–ˆā–ˆā–ˆā–ˆā–ˆ
ā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆā–ˆ

Impact

Stored xss vulnerability can execute arbitrary xss and steal user credentials

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High