Improper Certificate Validation vulnerability in Apache Airflow FTP Provider.
The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly.
This issue affects Apache Airflow FTP Provider: before 3.7.0.
Users are recommended to upgrade to version 3.7.0, which fixes the issue.
CPE | Name | Operator | Version |
---|---|---|---|
apache-airflow-providers-ftp | lt | 3.7.0 |
www.openwall.com/lists/oss-security/2024/04/19/3
docs.python.org/3/library/ssl.html#best-defaults
github.com/advisories/GHSA-3gg8-mc87-cq3h
github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280
github.com/apache/airflow/pull/38266
lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2
nvd.nist.gov/vuln/detail/CVE-2024-29733