Description
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0040 | The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely. |
Github GHSA |
GHSA-86vp-x3pr-79rx | Apache Airflow cross-site scripting due to incomplete fix for CVE-2020-13944 |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:27:33.389Z
Reserved: 2020-08-12T00:00:00.000Z
Link: CVE-2020-17515
No data.
Status : Modified
Published: 2020-12-11T14:15:11.143
Modified: 2024-11-21T05:08:15.943
Link: CVE-2020-17515
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA