In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. The new "RBAC" UI is unaffected.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 04:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2020/01/14/2 - Mailing List, Third Party Advisory | |
| References | () https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b%40%3Cdev.airflow.apache.org%3E - | |
| References | () https://lists.apache.org/thread.html/r72487ad6b23d18689896962782f8c93032afe5c72a6bfd23b253352b%40%3Cusers.airflow.apache.org%3E - Mailing List, Vendor Advisory | 
07 Nov 2023, 03:03
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
        
        
  | 
Information
                Published : 2020-01-14 17:15
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12398
Mitre link : CVE-2019-12398
CVE.ORG link : CVE-2019-12398
JSON object : View
Products Affected
                apache
- airflow
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
