DirectorySecurity Advisories
Sign In
Security Advisories

CGA-r95c-6w6h-wgm6

Published

Last updated

https://images.chainguard.dev/security/CGA-r95c-6w6h-wgm6
Package

airflow

Latest Update
Fixed
Fixed Version

2.10.1-r0

Aliases
  • CVE-2024-45498
  • GHSA-c392-whpc-vfpr

Severity

8.8

High

CVSS V3

Summary

Apache Airflow vulnerable to Improper Encoding or Escaping of Output

Description

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873  for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images