CVE-2020-9485: Stored XSS in Apache Airflow
6.1
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-airflow | pip | < 1.10.11 | 1.10.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability exists in the Chart pages of the classic UI, which are rendered via Flask
view functions. Stored XSS typically occurs when user-controlled input is persisted and later rendered without proper sanitization. The 'chart' view function (or similar) would handle chart data retrieval and template rendering. Since the advisory specifies the classic UI's Chart pages as the attack vector, the view function responsible for this endpoint is the most likely candidate. The lack of HTML escaping in template variables (e.g., {{ variable | safe }} instead of {{ variable }}) would directly enable XSS. While exact code isn't available, Airflow
's architecture and the vulnerability description strongly implicate the chart-rendering view function.