Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-c392-whpc-vfpr: Apache Airflow vulnerable to Improper Encoding or Escaping of Output

Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873 for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.

ghsa
#vulnerability#apache#git#auth

Apache Airflow vulnerable to Improper Encoding or Escaping of Output

High severity GitHub Reviewed Published Sep 7, 2024 to the GitHub Advisory Database • Updated Sep 9, 2024

ghsa: Latest News

GHSA-2237-5r9w-vm8j: Connect-CMS information that is restricted to viewing is visible