Описание
Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873 for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.
Ссылки
- Issue Tracking
- Mailing ListVendor Advisory
- Mailing List
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:apache:airflow:2.10.0:-:*:*:*:*:*:*
EPSS
Процентиль: 81%
0.01625
Низкий
8.8 High
CVSS3
Дефекты
CWE-116
Связанные уязвимости
CVSS3: 8.8
debian
больше 1 года назад
Example DAG: example_inlet_event_extra.py shipped with Apache Airflow ...
CVSS3: 8.8
github
больше 1 года назад
Apache Airflow vulnerable to Improper Encoding or Escaping of Output
EPSS
Процентиль: 81%
0.01625
Низкий
8.8 High
CVSS3
Дефекты
CWE-116