Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.
References
Link | Resource |
---|---|
https://github.com/spotify/luigi/blob/2.7.9/luigi/server.py#L67 | Exploit Third Party Advisory |
https://github.com/spotify/luigi/pull/1870 | Exploit Third Party Advisory |
https://groups.google.com/forum/#%21topic/luigi-user/ZgfRTpBsVUY |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:58
Updated: 2022-10-03T16:21:58
Reserved: 2018-11-02T00:00:00
Link: CVE-2018-1000843
JSON object: View
NVD Information
Status : Modified
Published: 2018-12-20T15:29:02.047
Modified: 2023-11-07T02:51:13.777
Link: CVE-2018-1000843
JSON object: View
Redhat Information
No data.
CWE