Severity: low Affected versions:
- Apache Airflow FTP Provider before 3.7.0 Description: Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly. This issue affects Apache Airflow FTP Provider: before 3.7.0. Users are recommended to upgrade to version 3.7.0, which fixes the issue. Credit: Eric Brown of Secure Sauce LLC (finder) References: https://github.com/apache/airflow/pull/38266 https://github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280 https://docs.python.org/3/library/ssl.html#best-defaults https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-29733 --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@airflow.apache.org For additional commands, e-mail: users-h...@airflow.apache.org