Lucene search

K
ApacheAirflow

16 matches found

CVE
CVE
added 2020/07/17 12:15 a.m.1042 views

CVE-2020-11978

An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on...

8.8CVSS9.1AI score0.94269EPSS
CVE
CVE
added 2024/07/17 8:15 a.m.231 views

CVE-2024-39877

Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to vers...

8.8CVSS8.8AI score0.00125EPSS
CVE
CVE
added 2024/09/07 8:15 a.m.217 views

CVE-2024-45034

Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author.Users are advised to upgrade to version 2.10.1 or later, w...

8.8CVSS8.7AI score0.00638EPSS
CVE
CVE
added 2024/09/07 8:15 a.m.208 views

CVE-2024-45498

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the...

8.8CVSS8.7AI score0.01201EPSS
CVE
CVE
added 2024/07/17 8:15 a.m.205 views

CVE-2024-39863

Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.

8.1CVSS5.2AI score0.0019EPSS
CVE
CVE
added 2022/02/25 9:15 a.m.139 views

CVE-2022-24288

In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.

8.8CVSS8.8AI score0.91763EPSS
CVE
CVE
added 2022/10/07 7:15 a.m.103 views

CVE-2022-41672

In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API.

8.1CVSS7.9AI score0.00234EPSS
CVE
CVE
added 2022/11/14 10:15 a.m.92 views

CVE-2022-40127

A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.

8.8CVSS8.8AI score0.93845EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.72 views

CVE-2019-0229

A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have adequate protection and were vulnerable to cross-site request forgery attacks.

8.8CVSS8.7AI score0.00401EPSS
CVE
CVE
added 2023/08/23 4:15 p.m.72 views

CVE-2023-37379

Apache Airflow, in versions prior to 2.7.0, contains a security vulnerability that can be exploited by an authenticated user possessing Connection edit privileges. This vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, l...

8.1CVSS7.8AI score0.00233EPSS
CVE
CVE
added 2023/08/05 7:15 a.m.72 views

CVE-2023-39508

Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserve...

8.8CVSS8.8AI score0.00539EPSS
CVE
CVE
added 2024/03/14 9:15 a.m.72 views

CVE-2024-28746

Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access resources such as variables, connections, etc from the UI which they do not have permission to access. Users of Apache Airflow are recommended to upgrade to version...

8.1CVSS7.9AI score0.00054EPSS
CVE
CVE
added 2019/01/23 5:29 p.m.69 views

CVE-2017-15720

In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.

8.8CVSS8.6AI score0.00364EPSS
CVE
CVE
added 2019/01/23 5:29 p.m.65 views

CVE-2017-17835

In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow.

8.8CVSS8.9AI score0.00243EPSS
CVE
CVE
added 2023/08/23 4:15 p.m.64 views

CVE-2023-40273

The session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user. Other than manually cleaning the session database (for database session backend...

8CVSS7.7AI score0.00256EPSS
CVE
CVE
added 2022/08/16 2:15 p.m.57 views

CVE-2022-38362

Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.

8.8CVSS8.8AI score0.00503EPSS