luigi@2.4.0 vulnerabilities
Workflow mgmgt + task scheduling + dependency resolution.
-
latest version
3.5.2
-
latest non vulnerable version
-
first published
12 years ago
-
latest version published
2 months ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the luigi package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
luigi is a package that helps you build complex pipelines of batch jobs. It handles dependency resolution, workflow management, visualization, handling failures, command line integration, and much more. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,3.2.1)
|
luigi is a package that helps you build complex pipelines of batch jobs. It handles dependency resolution, workflow management, visualization, handling failures, command line integration, and much more. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via API endpoint: /api/ that can expose task metadata such as task name, id, parameter, etc to an unauthorized users. This attack can be exploited only when the victim visits a specially crafted webpage from the network where their Luigi server is accessible. How to fix Cross-site Request Forgery (CSRF)? Upgrade |
[2.3.3,2.8.0)
|
luigi is a Python package that helps you build complex pipelines of batch jobs. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks while using How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.7.5)
|