First published: Wed Jan 23 2019(Updated: )
In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <=1.8.2 | |
pip/apache-airflow | <=1.8.2 | 1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15720 is classified as a critical vulnerability due to its ability to allow authenticated users to execute remote code on the Airflow webserver.
To fix CVE-2017-15720, upgrade Apache Airflow to version 1.9.0 or later.
CVE-2017-15720 affects Apache Airflow versions up to and including 1.8.2.
No, CVE-2017-15720 requires authentication for exploitation.
There are no known workarounds for CVE-2017-15720, so upgrading is the only effective solution.