-
CVSS Score
-The vulnerability stems from improper input sanitization in the get_safe_url function. The commit diff shows this function was modified to replace urlparse with urlsplit/urljoin and implement proper host/scheme validation. The original code's validation logic (checking parsed.scheme in ['http','https',''] and parsed.netloc in [request.host, '']) could allow URIs with dangerous schemes if the netloc matched the host (e.g., 'javascript:alert(1)' with host netloc). The test cases added in the patch demonstrate protection against XSS vectors like 'javascript:alert(1)', confirming the function's role in the vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| apache-airflow | pip | < 2.4.2rc1 | 2.4.2rc1 |