Severity: low

Affected versions:

- Apache Airflow 2.10.0

Description:

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 
2.10.0 has a vulnerability that allows an authenticated attacker with only DAG 
trigger permission to execute arbitrary commands. If you used that example as 
the base of your DAGs - please review if you have not copied the dangerous 
example; see  https://github.com/apache/airflow/pull/41873  for more 
information. We recommend against exposing the example DAGs in your deployment. 
If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.

Credit:

Nhien Pham (aka nhienit) at Galaxy One (finder)
Amogh Desai (remediation developer)

References:

https://github.com/apache/airflow/pull/41873
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-45498

Reply via email to