CVE-2022-24288
Summary
| CVE | CVE-2022-24288 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-25 09:15:00 UTC |
| Updated | 2022-03-04 20:41:00 UTC |
| Description | In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t | MISC | lists.apache.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: The Apache Airflow PMC would like to thank Kai Zhao of the TToU Security Team for reporting this issue.
Legacy QID Mappings
- 376461 Apache AirFlow Remote Code Execution (RCE) Vulnerability