First published: Fri Feb 25 2022(Updated: )
In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.2.4 | |
pip/apache-airflow | <2.2.4 | 2.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24288 is a vulnerability in Apache Airflow prior to version 2.2.4 that allows for OS Command Injection from the web UI.
CVE-2022-24288 has a severity score of 8.8, which is considered high.
CVE-2022-24288 affects Apache Airflow versions prior to 2.2.4.
To fix CVE-2022-24288, update Apache Airflow to version 2.2.4 or later.
More information about CVE-2022-24288 can be found at the following link: [https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t](https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t)