Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability.
References
Link | Resource |
---|---|
https://github.com/apache/airflow/pull/40522 | Issue Tracking Patch |
https://lists.apache.org/thread/1xhj9dkp37d6pzn24ll2mf94wbqnb2y1 | Mailing List |
Configurations
History
No history.
Information
Published : 2024-07-17 08:15
Updated : 2024-07-19 16:04
NVD link : CVE-2024-39877
Mitre link : CVE-2024-39877
CVE.ORG link : CVE-2024-39877
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')