​
DirectorySecurity Advisories
Sign In
Security Advisories

CVE-2024-45498

Published

Last updated

https://nvd.nist.gov/vuln/detail/CVE-2024-45498

Severity

8.8

High

CVSS V3

Summary

Apache Airflow vulnerable to Improper Encoding or Escaping of Output

Description

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873  for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.

References

  • https://github.com/advisories/GHSA-c392-whpc-vfpr

Affected packages


Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images