Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-c392-whpc-vfpr] Apache Airflow vulnerable to Improper Encoding or Escaping of Output #5037

Conversation

exolightor
Copy link

Updates

  • Affected products
  • CVSS v3

Comments
Airflow versions < 2.10.0 are not affected by this CVE since the file example_inlet_event_extra.py was added in v2.10.0. Security Scanners like Trivy falsely detect this CVE for versions < 2.10.0.

@github-actions github-actions bot changed the base branch from main to exolightor/advisory-improvement-5037 November 25, 2024 14:59
@exolightor
Copy link
Author

exolightor commented Nov 25, 2024

Sources: The maintainers mention that the file is introduced in 2.10.0 in the mailing thread: thread (which is also in the description of this Github Advisory DB entry) and we can see that the file was added with the commit c3a5b6e which is only inlcuded in the release tags starting 2.10.0b1.

@advisory-database advisory-database bot merged commit b46cfa2 into exolightor/advisory-improvement-5037 Nov 25, 2024
2 checks passed
@advisory-database
Copy link
Contributor

Hi @exolightor! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future!

@advisory-database advisory-database bot deleted the exolightor-GHSA-c392-whpc-vfpr branch November 25, 2024 15:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant