Apache.Airflow.Example.DAG.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Apache Software Foundation Airflow.
This vulnerability is due to improper input validation for parameters for directed acyclic graphs (DAGs). A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in OS command injection.
Affected Products
Apache Software Foundation Airflow prior to 1.10.10
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://lists.apache.org/thread/cn57zwylxsnzjyjztwqxpmly0x9q5ljx
Version Updates
Date | Version | Detail |
---|---|---|
2022-07-15 | 0.00324 |