Apache.Airflow.Example.DAG.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Apache Software Foundation Airflow.
This vulnerability is due to improper input validation for parameters for directed acyclic graphs (DAGs). A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in OS command injection.
Affected Products
Apache Software Foundation Airflow prior to 1.10.10
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://lists.apache.org/thread/cn57zwylxsnzjyjztwqxpmly0x9q5ljx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |