Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Link | Tags |
---|---|
https://github.com/apache/airflow/pull/41672 | patch issue tracking |
https://lists.apache.org/thread/b4fcw33vh60yfg9990n5vmc7sy2dcgjx | mailing list vendor advisory |
http://www.openwall.com/lists/oss-security/2024/09/06/3 | mailing list |