CVE-2024-39877
Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability.
Apache Airflow 2.4.0 y versiones anteriores a 2.9.3 tienen una vulnerabilidad que permite a los autores de DAG autenticados crear un parámetro doc_md de manera que pueda ejecutar código arbitrario en el contexto del programador, lo que debería estar prohibido según el modelo de seguridad de Airflow. Los usuarios deben actualizar a la versión 2.9.3 o posterior, que eliminó la vulnerabilidad.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-07-01 CVE Reserved
- 2024-07-17 CVE Published
- 2024-08-19 EPSS Updated
- 2024-09-13 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CWE-277: Insecure Inherited Permissions
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/apache/airflow/pull/40522 | 2024-07-19 |
URL | Date | SRC |
---|---|---|
https://lists.apache.org/thread/1xhj9dkp37d6pzn24ll2mf94wbqnb2y1 | 2024-07-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Airflow Search vendor "Apache" for product "Airflow" | >= 2.4.0 < 2.9.3 Search vendor "Apache" for product "Airflow" and version " >= 2.4.0 < 2.9.3" | - |
Affected
|