You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airflow.apache.org by "ASF subversion and git services (JIRA)" <ji...@apache.org> on 2017/09/18 18:43:00 UTC

[jira] [Commented] (AIRFLOW-1617) XSS Vulnerability in Variable endpoint

    [ https://issues.apache.org/jira/browse/AIRFLOW-1617?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16170476#comment-16170476 ] 

ASF subversion and git services commented on AIRFLOW-1617:
----------------------------------------------------------

Commit 8f9bf94d82abc59336e642db64e575cee0cc5df0 in incubator-airflow's branch refs/heads/master from [~bolke]
[ https://git-wip-us.apache.org/repos/asf?p=incubator-airflow.git;h=8f9bf94 ]

[AIRFLOW-1617] Fix XSS vulnerability in Variable endpoint

In case a Variable form was accessed by a get request and
the form did not exist as a template, the input was
returned as is to the user.

Closes #2611 from bolkedebruin/xss_fix


> XSS Vulnerability in Variable endpoint
> --------------------------------------
>
>                 Key: AIRFLOW-1617
>                 URL: https://issues.apache.org/jira/browse/AIRFLOW-1617
>             Project: Apache Airflow
>          Issue Type: Bug
>          Components: webserver
>    Affects Versions: 1.8.2
>            Reporter: Bolke de Bruin
>            Priority: Critical
>              Labels: security
>             Fix For: 1.9.0, 1.8.3
>
>
> Variable view has an XSS vulnerability when the Variable template does not exist. The input is returned to the user as is, without escaping.
> Original report by Seth Long. CVE is pending



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)