Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/apache/airflow/pull/40475 | patch issue tracking |
https://lists.apache.org/thread/gxkvs279f1mbvckv5q65worr6how20o3 | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2024/07/16/6 |