First published: Thu Jul 16 2020(Updated: )
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <=1.10.10 | |
pip/apache-airflow | <1.10.11 | 1.10.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11982 is considered a critical vulnerability due to its potential for remote code execution.
To remediate CVE-2020-11982, upgrade to Apache Airflow version 1.10.11 or later.
Apache Airflow versions 1.10.10 and below are affected by CVE-2020-11982.
CVE-2020-11982 allows a deserialization attack potentially leading to remote code execution if the attacker can connect to the message broker.
CVE-2020-11982 involves message brokers like Redis and RabbitMQ when using the CeleryExecutor.