Apache Airflow could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in the “/confirm” endpoint. An attacker could exploit this vulnerability using a specially-crafted URL to redirect a victim to arbitrary Web sites.
Apache Airflow is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the “Trigger DAG with config” screen. A remote attacker could exploit this vulnerability using the origin parameter in a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Apache Airflow 2.4.1
Upgrade to the latest version of Apache Airflow, available from the Apache Airflow GIT Repository.