Description
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0034 | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker. |
Github GHSA |
GHSA-9g2w-5f3v-mfmm | Insecure default config of Celery worker in Apache Airflow |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T11:48:57.514Z
Reserved: 2020-04-21T00:00:00.000Z
Link: CVE-2020-11982
No data.
Status : Modified
Published: 2020-07-17T00:15:10.477
Modified: 2024-11-21T04:59:02.707
Link: CVE-2020-11982
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA