CVE-2020-11981 – apache-airflow
Package
Manager: pip
Name: apache-airflow
Vulnerable Version: >=0 <1.10.11rc1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.91159 pctl0.99636
Details
Command injection via Celery broker in Apache Airflow An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
Metadata
Created: 2020-07-27T16:57:33Z
Modified: 2024-09-11T21:13:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-976r-qfjj-c24w/GHSA-976r-qfjj-c24w.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-976r-qfjj-c24w
Finding: F404
Auto approve: 1