CVE-2019-12417

Published at:
2019-10-30T22:15:10.807

Global infos:

A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process.

CVE Status: Modified

References:

  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityLOW
    Attack VectorNETWORK
    Availability ImpactNONE
    Base Score4.8
    Base SeverityMEDIUM
    Confidentiality ImpactLOW
    Integrity ImpactLOW
    Privileges RequiredHIGH
    ScopeCHANGED
    User InteractionREQUIRED
    Vector StringCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
    Exploitability Score1.7
    Impact Score2.7
    Source[email protected]
    TypePrimary

    Links:

    Exploit-db
    Github