Skip to content

Commit 7f7941a

Browse files
1 parent 1b475fe commit 7f7941a

File tree

3 files changed

+135
-9
lines changed

3 files changed

+135
-9
lines changed

advisories/unreviewed/2026/03/GHSA-9r5j-7r2x-rv4g/GHSA-9r5j-7r2x-rv4g.json renamed to advisories/github-reviewed/2026/03/GHSA-9r5j-7r2x-rv4g/GHSA-9r5j-7r2x-rv4g.json

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9r5j-7r2x-rv4g",
4-
"modified": "2026-03-09T18:31:43Z",
4+
"modified": "2026-03-10T01:21:24Z",
55
"published": "2026-03-09T12:31:38Z",
66
"aliases": [
77
"CVE-2025-69219"
88
],
9-
"details": "A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.\n\nYou should upgrade to version 6.0.0 of the provider to avoid even that risk.",
9+
"summary": "Apache Airflow Providers Http has Unsafe Pickle Deserializatio leading to RCE via HttpOperator",
10+
"details": "A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low.\n\nUsers should upgrade to version 6.0.0 of the provider to avoid even that risk.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "apache-airflow-providers-http"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "6.0.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,14 @@
2344
"type": "WEB",
2445
"url": "https://github.com/apache/airflow/pull/61662"
2546
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/apache/airflow/commit/97839f7b0a8ae66d6079bb7fad5a363068f61617"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/apache/airflow"
54+
},
2655
{
2756
"type": "WEB",
2857
"url": "https://lists.apache.org/thread/zjkfb2njklro68tqzym092r4w65m5dq0"
@@ -37,8 +66,8 @@
3766
"CWE-913"
3867
],
3968
"severity": "HIGH",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2026-03-10T01:21:24Z",
4271
"nvd_published_at": "2026-03-09T11:16:05Z"
4372
}
4473
}
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-m6hv-x64c-27mm",
4+
"modified": "2026-03-10T01:20:19Z",
5+
"published": "2026-03-10T01:20:19Z",
6+
"aliases": [
7+
"CVE-2026-30974"
8+
],
9+
"summary": "copyparty: volflag `nohtml` did not block javascript in svg files",
10+
"details": "### Summary\nThe `nohtml` config option, intended to prevent execution of JavaScript in user-uploaded HTML files, did not apply to SVG images.\n\n### Details\nA user with write-permission could upload an SVG containing embedded JavaScript, which would execute in the context of whichever user opens it.\n\nThis in itself is not a vulnerability; it is intended behavior according to [the SVG spec](https://www.w3.org/TR/SVG11/script.html). The vulnerability is that the `nohtml` volflag, when enabled, did not prevent this.\n\n`nohtml`, intended for use on volumes which contains untrusted files, would correctly prevent execution of javascript in HTML files, but did not consider SVG images. This has been fixed in v1.20.11.\n\n### Impact\nThe malicious JavaScript could move or delete existing files on the server, or upload new files, using the account of the person who opens the SVG.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "copyparty"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.20.11"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 1.20.10"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/9001/copyparty/security/advisories/GHSA-m6hv-x64c-27mm"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/9001/copyparty/commit/1c9f894e149b6be3cc7de81efc93a4ce4766e0e5"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/9001/copyparty"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/9001/copyparty/releases/tag/v1.20.11"
57+
}
58+
],
59+
"database_specific": {
60+
"cwe_ids": [
61+
"CWE-79"
62+
],
63+
"severity": "MODERATE",
64+
"github_reviewed": true,
65+
"github_reviewed_at": "2026-03-10T01:20:19Z",
66+
"nvd_published_at": null
67+
}
68+
}

advisories/unreviewed/2026/03/GHSA-rv5f-ccpm-xjj4/GHSA-rv5f-ccpm-xjj4.json renamed to advisories/github-reviewed/2026/03/GHSA-rv5f-ccpm-xjj4/GHSA-rv5f-ccpm-xjj4.json

Lines changed: 33 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rv5f-ccpm-xjj4",
4-
"modified": "2026-03-09T18:31:43Z",
4+
"modified": "2026-03-10T01:22:21Z",
55
"published": "2026-03-09T12:31:38Z",
66
"aliases": [
77
"CVE-2026-25604"
88
],
9+
"summary": "Apache Airflow AWS Auth Manager has Host Header Injection Leading to SAML Authentication Bypass",
910
"details": "In AWS Auth manager, the origin of the SAML authentication has been used as provided by the client and not verified against the actual instance URL. \nThis allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances.\n\nYou should upgrade to 9.22.0 version of provider if you use AWS Auth Manager.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "apache-airflow-providers-amazon"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "9.22.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,14 @@
2344
"type": "WEB",
2445
"url": "https://github.com/apache/airflow/pull/61368"
2546
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/apache/airflow/commit/1a86aec01d827ba8caf41b645db56663a9a61850"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/apache/airflow"
54+
},
2655
{
2756
"type": "WEB",
2857
"url": "https://lists.apache.org/thread/spwwrsmwxod7fpttcd7n7zs46j839l77"
@@ -37,8 +66,8 @@
3766
"CWE-346"
3867
],
3968
"severity": "MODERATE",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
69+
"github_reviewed": true,
70+
"github_reviewed_at": "2026-03-10T01:22:21Z",
4271
"nvd_published_at": "2026-03-09T11:16:06Z"
4372
}
4473
}

0 commit comments

Comments
 (0)