logo

CVE-2020-11981 apache-airflow

Package

Manager: pip
Name: apache-airflow
Vulnerable Version: >=0 <1.10.11rc1

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.91159 pctl0.99636

Details

Command injection via Celery broker in Apache Airflow An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.

Metadata

Created: 2020-07-27T16:57:33Z
Modified: 2024-09-11T21:13:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-976r-qfjj-c24w/GHSA-976r-qfjj-c24w.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-976r-qfjj-c24w
Finding: F404
Auto approve: 1