Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.
Workaround:
Link | Tags |
---|---|
https://lists.apache.org/thread/614p38nf4gbk8xhvnskj9b1sqo2dknkb | mailing list vendor advisory |
http://www.openwall.com/lists/oss-security/2022/08/16/1 | third party advisory mailing list |