Lucene search

K

6 matches found

CVE
CVE
added 2021/05/02 8:15 a.m.886 views

CVE-2021-28359

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions

6.1CVSS7.1AI score0.17045EPSS
CVE
CVE
added 2021/09/09 3:15 p.m.88 views

CVE-2021-38540

The variable import endpoint was not protected by authentication in Airflow >=2.0.0, =2.0.0,

9.8CVSS9.8AI score0.90036EPSS
CVE
CVE
added 2021/02/17 3:15 p.m.75 views

CVE-2021-26559

Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when [webserver] expose_config is set to False in airflow.cfg. This allowed a privilege escalation attack....

6.5CVSS6.4AI score0.00297EPSS
CVE
CVE
added 2021/02/17 3:15 p.m.73 views

CVE-2021-26697

The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just ...

5.3CVSS5.2AI score0.02431EPSS
CVE
CVE
added 2021/06/07 7:15 p.m.68 views

CVE-2021-29621

Flask-AppBuilder is a development framework, built on top of Flask. User enumeration in database authentication in Flask-AppBuilder

5.3CVSS5.2AI score0.0029EPSS
CVE
CVE
added 2021/08/16 8:15 a.m.64 views

CVE-2021-35936

If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of D...

5.3CVSS5.7AI score0.00113EPSS