Description
In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.
Published: 2022-02-25
Score: 8.8 High
EPSS: 89.1% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

This can be mitigated by ensuring `[core] load_examples` is set to `False`.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3v7g-4pg3-7r6j OS Command injection in Apache Airflow
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T04:07:02.359Z

Reserved: 2022-02-01T00:00:00.000Z

Link: CVE-2022-24288

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-25T09:15:06.957

Modified: 2024-11-21T06:50:05.807

Link: CVE-2022-24288

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses