logo

CVE-2024-39877 apache-airflow

Package

Manager: pip
Name: apache-airflow
Vulnerable Version: >=2.4.0 <2.9.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00042 pctl0.11889

Details

Apache Airflow has DAG Author Code Execution possibility in airflow-scheduler Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability.

Metadata

Created: 2024-07-17T09:30:49Z
Modified: 2025-01-21T17:58:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-g5hv-r743-v8pm/GHSA-g5hv-r743-v8pm.json
CWE IDs: ["CWE-277", "CWE-94"]
Alternative ID: GHSA-g5hv-r743-v8pm
Finding: F184
Auto approve: 1