You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@airflow.apache.org by Ash Berlin-Taylor <as...@apache.org> on 2020/07/13 17:54:49 UTC

Apache Airflow security vulnerabilities fixed in v1.10.11: CVE-2020-9485, CVE-2020-11978, CVE-2020-11981, CVE-2020-11982, CVE-2020-11983, CVE-2020-13927

Hi Airflow community.

Please find below information about five vulnerabilities which have been addressed in Apache Airflow v1.10.11:
CVE-2020-9485 - Stored XSS on (deprecated) Chart pages
A stored XSS vulnerability was discovered in the Chart pages of the the "classic" UI.
Reported by Mika Kulmala of Solita.fi
CVE-2020-11978 - RCE/command execution in example dag
A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use).
If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
Reported by xuxiang of DtDream security
CVE-2020-11981 - Command injection via Celery broker
When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
Reported by Adam Goldschmit of Snyk.io
CVE-2020-11982 - Insecure default config of Celery worker
When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.
Reported by Adam Goldschmit of Snyk
CVE-2020-11983 - Multiple stored XSS in RBAC Admin screens
It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks.
Reported by Ali Al-Habsi of Accellion, Inc.
It is recommended to upgrade to Airflow 1.10.11 to address all these vulnerabilities.
Thanks,
Ash @ Airflow PMC