Lucene search

K
cveApacheCVE-2024-45034
HistorySep 07, 2024 - 8:15 a.m.

CVE-2024-45034

2024-09-0708:15:11
CWE-250
apache
web.nvd.nist.gov
34
apache airflow
vulnerability
unauthorized code
upgrade
version 2.10.1

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.5%

Apache Airflow versions before 2.10.1 have a vulnerability that allowsΒ DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author.
Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.

Affected configurations

Vulners
Vulnrichment
Node
apache_software_foundationapache_airflowRange≀2.10.1
VendorProductVersionCPE
apache_software_foundationapache_airflow*cpe:2.3:a:apache_software_foundation:apache_airflow:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "collectionURL": "https://pypi.python.org",
    "defaultStatus": "unaffected",
    "packageName": "apache-airflow",
    "product": "Apache Airflow",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "2.10.1",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.5%