Description
In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Workaround
This can be mitigated by ensuring `[core] load_examples` is set to `False`.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3v7g-4pg3-7r6j | OS Command injection in Apache Airflow |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T04:07:02.359Z
Reserved: 2022-02-01T00:00:00.000Z
Link: CVE-2022-24288
No data.
Status : Modified
Published: 2022-02-25T09:15:06.957
Modified: 2024-11-21T06:50:05.807
Link: CVE-2022-24288
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA