6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
69.2%
apache-airflow is vulnerable to open redirect. The vulnerability exists due to the lack of URL filtering in FAB
and AirFlow
routes in the init_app
function of init_appbuilder.py
, allowing an attacker to redirect users to malicious URLs
CPE | Name | Operator | Version |
---|---|---|---|
apache-airflow | le | 2.4.2 | |
apache-airflow | le | 2.4.2 |
www.openwall.com/lists/oss-security/2022/11/15/1
github.com/advisories/GHSA-rg94-84xj-7gq3
github.com/apache/airflow/commit/f0f67e8bc9dcb9444cfc5b88ee075191785469b7
github.com/apache/airflow/pull/27576
github.com/apache/airflow/pull/27580
lists.apache.org/thread/nf4xrkoo6c81g6fdn4vj8k9x2686o9nh
www.openwall.com/lists/oss-security/2022/11/15/1
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.004 Low
EPSS
Percentile
69.2%