Arbitrary Code Execution Vulnerability in Apache Airflow
CVE-2024-39877
Summary
The CVE-2024-39877 vulnerability in Apache Airflow allows authenticated DAG authors to execute arbitrary code in the scheduler context, which is against the Airflow Security model. The affected versions are Apache-airflow 2.4.0 and versions before 2.9.3. Users are advised to upgrade to version 2.9.3 or later to remove the vulnerability. Additionally, Apache CloudStack has a vulnerability (CVE-2024-41107) that allows attackers to bypass authentication with a forged SAML response in versions 4.5.0 to 4.18.2.1 and 4.19.0.0 to 4.19.0.2. Vulnerability patches have been made available in the latest update, and users are encouraged to update to the latest version to address these vulnerabilities. No known exploits by ransomware groups have been reported for these vulnerabilities.
Affected Version(s)
Apache Airflow < 2.9.3
News Articles
References
CVSS V3.1
Timeline
- 📰
First article discovered by ASEC – AhnLab
Vulnerability published
Vulnerability Reserved