Safety vulnerability ID: 53990
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.
Latest version: 3.5.2
Workflow mgmgt + task scheduling + dependency resolution.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application