CVE-2020-17515: Apache Airflow cross-site scripting due to incomplete fix for CVE-2020-13944
(updated )
The origin
parameter passed to some of the endpoints like /trigger
was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.15. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.
References
- github.com/advisories/GHSA-86vp-x3pr-79rx
- github.com/apache/airflow
- github.com/apache/airflow/commit/13336272e32872247fa7d17e964ccd88ec8d1376
- github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953
- github.com/apache/airflow/commit/7486153f451e4d2bb1c6fd9cbb5a63430157c99c
- github.com/apache/airflow/commit/ab8c55878e3e4257d2276226cb17b047ba856686
- github.com/apache/airflow/commit/c6369beed53d41c0a70415b0d958bf0604124ad7
- github.com/apache/airflow/pull/14738
- github.com/apache/airflow/releases/tag/1.10.15
- github.com/apache/airflow/releases/tag/2.0.2
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2020-21.yaml
- lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E
- lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E
- lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E
- lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e%40%3Cusers.airflow.apache.org%3E
- lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E
- lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
- lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2020-17515
- pypi.org/project/apache-airflow
Detect and mitigate CVE-2020-17515 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →