You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airflow.apache.org by "ASF subversion and git services (JIRA)" <ji...@apache.org> on 2017/09/18 18:43:00 UTC
[jira] [Commented] (AIRFLOW-1617) XSS Vulnerability in Variable
endpoint
[ https://issues.apache.org/jira/browse/AIRFLOW-1617?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16170476#comment-16170476 ]
ASF subversion and git services commented on AIRFLOW-1617:
----------------------------------------------------------
Commit 8f9bf94d82abc59336e642db64e575cee0cc5df0 in incubator-airflow's branch refs/heads/master from [~bolke]
[ https://git-wip-us.apache.org/repos/asf?p=incubator-airflow.git;h=8f9bf94 ]
[AIRFLOW-1617] Fix XSS vulnerability in Variable endpoint
In case a Variable form was accessed by a get request and
the form did not exist as a template, the input was
returned as is to the user.
Closes #2611 from bolkedebruin/xss_fix
> XSS Vulnerability in Variable endpoint
> --------------------------------------
>
> Key: AIRFLOW-1617
> URL: https://issues.apache.org/jira/browse/AIRFLOW-1617
> Project: Apache Airflow
> Issue Type: Bug
> Components: webserver
> Affects Versions: 1.8.2
> Reporter: Bolke de Bruin
> Priority: Critical
> Labels: security
> Fix For: 1.9.0, 1.8.3
>
>
> Variable view has an XSS vulnerability when the Variable template does not exist. The input is returned to the user as is, without escaping.
> Original report by Seth Long. CVE is pending
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)