Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.
References
Link | Resource |
---|---|
https://groups.google.com/forum/#!topic/luigi-user/ZgfRTpBsVUY | Exploit Third Party Advisory |
https://github.com/spotify/luigi/pull/1870 | Exploit Third Party Advisory |
https://github.com/spotify/luigi/blob/2.7.9/luigi/server.py#L67 | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-12-20 07:29
Updated : 2019-02-07 06:18
NVD link : CVE-2018-1000843
Mitre link : CVE-2018-1000843
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
spotify
- luigi