Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user can use crafted input to make the current request hang. It is recommended to upgrade to a version that is not affected
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://github.com/apache/airflow/pull/32060 | patch |
https://lists.apache.org/thread/tokfs980504ylgk3cv3hjlnrtbv4tng4 | patch vendor advisory mailing list |