Apache Airflow has DAG Author Code Execution possibility in airflow-scheduler
High severity
GitHub Reviewed
Published
Jul 17, 2024
to the GitHub Advisory Database
•
Updated Aug 2, 2024
Description
Published by the National Vulnerability Database
Jul 17, 2024
Published to the GitHub Advisory Database
Jul 17, 2024
Reviewed
Jul 17, 2024
Last updated
Aug 2, 2024
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability.
References