logo

CVE-2020-11982 apache-airflow

Package

Manager: pip
Name: apache-airflow
Vulnerable Version: >=0 <1.10.11

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.05664 pctl0.90018

Details

Insecure default config of Celery worker in Apache Airflow An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.

Metadata

Created: 2020-07-27T16:57:33Z
Modified: 2024-09-11T19:46:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-9g2w-5f3v-mfmm/GHSA-9g2w-5f3v-mfmm.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-9g2w-5f3v-mfmm
Finding: F096
Auto approve: 1