Products
Apache Airflow
- 2.10.0
Source
security@apache.org
Tags
CVE-2024-45498 details
Published : Sept. 7, 2024, 8:15 a.m.
Last Modified : Sept. 7, 2024, 8:15 a.m.
Last Modified : Sept. 7, 2024, 8:15 a.m.
Description
Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873 for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-116 | Improper Encoding or Escaping of Output | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
References
URL | Source |
---|---|
https://github.com/apache/airflow/pull/41873 | security@apache.org |
https://lists.apache.org/thread/tl7lzczcqdmqj2pcpbvtjdpd2tb9561n | security@apache.org |
This website uses the NVD API, but is not approved or certified by it.