Lucene search

K
githubGitHub Advisory DatabaseGHSA-C392-WHPC-VFPR
HistorySep 07, 2024 - 9:30 a.m.

Apache Airflow vulnerable to Improper Encoding or Escaping of Output

2024-09-0709:30:31
CWE-116
GitHub Advisory Database
github.com
5
apache airflow
2.10.0
vulnerability
output encoding

AI Score

7.1

Confidence

High

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873 Β for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.

Affected configurations

Vulners
Node
apacheairflowRange<2.10.1
VendorProductVersionCPE
apacheairflow*cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

AI Score

7.1

Confidence

High

Related for GHSA-C392-WHPC-VFPR