Uploaded image for project: 'Apache Airflow'
  1. Apache Airflow
  2. AIRFLOW-4186

[security] ui - Application is vulnerable to redirection attacks

    XMLWordPrintableJSON

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: Major
    • Resolution: Not A Bug
    • Affects Version/s: None
    • Fix Version/s: None
    • Component/s: security, ui
    • Labels:
      None

      Description

      Issue Details
      The Web server uses user-controlled input data to construct a redirection URL when the "X-Forwarded-Host" header is added to a request. This header is not added by default by the application, but causes a redirect to be performed when provided by a user.
               
      The application's "X-Forwarded-Host" header is included with the site google.com, causing the application to respond with a 302 redirect to that location.
      The application successfully redirects to the specified website.
      Business Impact/Attack Scenario      
      An attacker who is able to intercept and modify client HTTP requests before reaching the application server could redirect the clients to a malicious host.
      Recommendation        
      Use the server’s name as the redirection destination where possible, or validate header values against a known whitelist.

        Attachments

          Activity

            People

            • Assignee:
              Unassigned
              Reporter:
              toopt4 t oo
            • Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: