Lucene search

K
osvGoogleOSV:GHSA-6PW3-8H9W-32GC
HistoryNov 14, 2022 - 12:00 p.m.

Apache Airflow vulnerable to OS Command Injection via example DAGs

2022-11-1412:00:15
Google
osv.dev
4
apache airflow
os command injection
example dags
ui access
arbitrary commands
run_id parameter
security vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.371 Low

EPSS

Percentile

97.2%

A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow versions prior to 2.4.0.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.371 Low

EPSS

Percentile

97.2%