You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airflow.apache.org by "Arthur Wiedmer (JIRA)" <ji...@apache.org> on 2017/04/03 19:15:42 UTC

[jira] [Resolved] (AIRFLOW-1007) Jinja sandbox is vulnerable to RCE

     [ https://issues.apache.org/jira/browse/AIRFLOW-1007?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Arthur Wiedmer resolved AIRFLOW-1007.
-------------------------------------
       Resolution: Fixed
    Fix Version/s: 1.9.0

Issue resolved by pull request #2184
[https://github.com/apache/incubator-airflow/pull/2184]

> Jinja sandbox is vulnerable to RCE
> ----------------------------------
>
>                 Key: AIRFLOW-1007
>                 URL: https://issues.apache.org/jira/browse/AIRFLOW-1007
>             Project: Apache Airflow
>          Issue Type: Bug
>            Reporter: Alex Guziel
>            Assignee: Alex Guziel
>             Fix For: 1.9.0
>
>
> Right now, the jinja template functionality in chart_data takes arbitrary strings and executes them. We should use the sandbox functionality to prevent this.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)