Description
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.
No analysis available yet.
Remediation
Vendor Workaround
Do not enable example dags on systems that should not allow UI user to execute an arbitrary command.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6pw3-8h9w-32gc | Apache Airflow vulnerable to OS Command Injection via example DAGs |
References
History
Wed, 30 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-04-30T18:58:45.160Z
Reserved: 2022-09-06T00:00:00.000Z
Link: CVE-2022-40127
Updated: 2024-08-03T12:14:39.589Z
Status : Modified
Published: 2022-11-14T10:15:10.293
Modified: 2025-04-30T19:15:50.510
Link: CVE-2022-40127
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA