
Cloud Vulnerability DB
A community-led vulnerabilities database
A session fixation vulnerability was identified in Apache Airflow versions 2.2.4 through 2.3.3, specifically affecting the database webserver session backend. The vulnerability was discovered by Kai Zhao and was assigned CVE-2022-38054, with public disclosure occurring on September 2, 2022 (OSS Security).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is classified under CWE-384 (Session Fixation) and affects the database webserver session backend implementation (NVD).
Given the CRITICAL CVSS score and the nature of session fixation vulnerabilities, this security flaw could potentially allow attackers to hijack user sessions, leading to unauthorized access to the application with the privileges of the compromised user (NVD).
Users running affected versions (2.2.4 through 2.3.3) of Apache Airflow should upgrade to a patched version of the software. The vulnerability was addressed in subsequent releases (Apache Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."