Lucene search

K
githubGitHub Advisory DatabaseGHSA-6PW3-8H9W-32GC
HistoryNov 14, 2022 - 12:00 p.m.

Apache Airflow vulnerable to OS Command Injection via example DAGs

2022-11-1412:00:15
CWE-78
CWE-94
GitHub Advisory Database
github.com
6
apache airflow
os command injection
example dags
vulnerability
ui access
run_id parameter
security issue
software
version 2.4.0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.371 Low

EPSS

Percentile

97.2%

A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow versions prior to 2.4.0.

Affected configurations

Vulners
Node
apacheairflowRange<2.4.0
CPENameOperatorVersion
apache-airflowlt2.4.0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.371 Low

EPSS

Percentile

97.2%