Skip to content

Cross-Site Request Forgery (CSRF) in Luigi

High severity GitHub Reviewed Published Dec 20, 2018 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

pip luigi (pip)

Affected versions

< 2.8.0

Patched versions

2.8.0

Description

Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/ that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.

References

Published to the GitHub Advisory Database Dec 20, 2018
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS score

0.284%
(69th percentile)

Weaknesses

CVE ID

CVE-2018-1000843

GHSA ID

GHSA-p69g-f978-xxv9

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.