Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-28779

Опубликовано: 17 мар. 2026
Источник: debian
EPSS Низкий

Описание

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
airflowitppackage

EPSS

Процентиль: 26%
0.00091
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
13 дней назад

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

CVSS3: 7.5
github
13 дней назад

Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications

EPSS

Процентиль: 26%
0.00091
Низкий