Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1e8bf9c9-d50f-d419-2a0a-777bd939b277@apache.org>
Date: Fri, 06 Sep 2024 16:43:56 +0000
From: Ephraim Anierobi <ephraimanierobi@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-45498: Apache Airflow: Command Injection in an example
 DAG 

Severity: low

Affected versions:

- Apache Airflow 2.10.0

Description:

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see  https://github.com/apache/airflow/pull/41873  for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.

Credit:

Nhien Pham (aka nhienit) at Galaxy One (finder)
Amogh Desai (remediation developer)

References:

https://github.com/apache/airflow/pull/41873
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-45498

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.