In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/apache/airflow/pull/27143 | Issue Tracking Third Party Advisory | 
| https://lists.apache.org/thread/vqnvdrfsw9z7v7c46qh3psjgr7wy959l | Issue Tracking Mailing List Vendor Advisory | 
| https://github.com/apache/airflow/pull/27143 | Issue Tracking Third Party Advisory | 
| https://lists.apache.org/thread/vqnvdrfsw9z7v7c46qh3psjgr7wy959l | Issue Tracking Mailing List Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/apache/airflow/pull/27143 - Issue Tracking, Third Party Advisory | |
| References | () https://lists.apache.org/thread/vqnvdrfsw9z7v7c46qh3psjgr7wy959l - Issue Tracking, Mailing List, Vendor Advisory | 
Information
                Published : 2022-11-02 12:15
Updated : 2025-05-02 21:15
NVD link : CVE-2022-43982
Mitre link : CVE-2022-43982
CVE.ORG link : CVE-2022-43982
JSON object : View
Products Affected
                apache
- airflow
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
