CVE-2020-11982 – apache-airflow
Package
Manager: pip
Name: apache-airflow
Vulnerable Version: >=0 <1.10.11
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.05664 pctl0.90018
Details
Insecure default config of Celery worker in Apache Airflow An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.
Metadata
Created: 2020-07-27T16:57:33Z
Modified: 2024-09-11T19:46:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-9g2w-5f3v-mfmm/GHSA-9g2w-5f3v-mfmm.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-9g2w-5f3v-mfmm
Finding: F096
Auto approve: 1