Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs. 
Users are recommended to upgrade to version 2.9.1, which fixes this issue.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2024/05/14/1 | Mailing List Third Party Advisory | 
| https://github.com/apache/airflow/pull/38882 | Issue Tracking Patch | 
| https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 | Mailing List Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2024/05/14/1 | Mailing List Third Party Advisory | 
| https://github.com/apache/airflow/pull/38882 | Issue Tracking Patch | 
| https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 | Mailing List Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    13 Feb 2025, 18:18
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs. Users are recommended to upgrade to version 2.9.1, which fixes this issue. | 
11 Dec 2024, 15:34
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Apache airflow
         Apache  | 
|
| CPE | cpe:2.3:a:apache:airflow:2.9.0:beta1:*:*:*:*:*:* cpe:2.3:a:apache:airflow:2.9.0:-:*:*:*:*:*:* cpe:2.3:a:apache:airflow:2.9.0:beta2:*:*:*:*:*:* cpe:2.3:a:apache:airflow:2.9.0:rc2:*:*:*:*:*:* cpe:2.3:a:apache:airflow:2.9.0:rc3:*:*:*:*:*:* cpe:2.3:a:apache:airflow:2.9.0:rc1:*:*:*:*:*:*  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.4  | 
| References | () http://www.openwall.com/lists/oss-security/2024/05/14/1 - Mailing List, Third Party Advisory | |
| References | () https://github.com/apache/airflow/pull/38882 - Issue Tracking, Patch | |
| References | () https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 - Mailing List, Vendor Advisory | 
21 Nov 2024, 09:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2024/05/14/1 - | |
| References | () https://github.com/apache/airflow/pull/38882 - | |
| References | () https://lists.apache.org/thread/gsjmnrqb3m5fzp0vgpty1jxcywo91v77 - | 
10 Jun 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| References | 
        
        
  | 
14 May 2024, 16:17
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-05-14 16:17
Updated : 2025-03-27 20:15
NVD link : CVE-2024-32077
Mitre link : CVE-2024-32077
CVE.ORG link : CVE-2024-32077
JSON object : View
Products Affected
                apache
- airflow
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
