漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications
Vulnerability Description
Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.
CVSS Information
N/A
Vulnerability Type
将资源暴露给错误范围
Vulnerability Title
Apache Airflow 安全漏洞
Vulnerability Description
Apache Airflow是美国阿帕奇(Apache)基金会的一套具有创建、管理和监控工作流程功能的开源平台。该平台具有可扩展和动态监控等特点。 Apache Airflow 3.1.0至3.1.7版本存在安全漏洞,该漏洞源于会话令牌路径设置不当,可能导致同域下任何应用程序捕获有效会话令牌,实现完全会话接管。
CVSS Information
N/A
Vulnerability Type
N/A