Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.
History

Mon, 09 Sep 2024 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 09 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
References

Sat, 07 Sep 2024 08:00:00 +0000

Type Values Removed Values Added
Description Apache Airflow versions before 2.10.1 have a vulnerability that allows DAG authors to add local settings to the DAG folder and get it executed by the scheduler, where the scheduler is not supposed to execute code submitted by the DAG author. Users are advised to upgrade to version 2.10.1 or later, which has fixed the vulnerability.
Title Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes
Weaknesses CWE-250
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2024-09-07T07:45:27.654Z

Updated: 2024-09-09T13:55:13.683Z

Reserved: 2024-08-21T12:41:18.078Z

Link: CVE-2024-45034

cve-icon Vulnrichment

Updated: 2024-09-07T08:03:12.429Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-07T08:15:11.123

Modified: 2024-09-09T14:35:07.577

Link: CVE-2024-45034

cve-icon Redhat

No data.