Lucene search

K
osvGoogleOSV:BIT-AIRFLOW-2020-11982
HistoryMar 06, 2024 - 11:01 a.m.

BIT-airflow-2020-11982

2024-03-0611:01:18
Google
osv.dev
4
apache airflow
celeryexecutor
vulnerability
remote code execution
deserialization attack

7.3 High

AI Score

Confidence

Low

0.01 Low

EPSS

Percentile

83.8%

An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.

CPENameOperatorVersion
airflowlt1.10.10

7.3 High

AI Score

Confidence

Low

0.01 Low

EPSS

Percentile

83.8%

Related for OSV:BIT-AIRFLOW-2020-11982