[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2022-40189: Apache Airlfow Pig Provider RCE
From:       Jarek Potiuk <potiuk () apache ! org>
Date:       2022-11-21 20:33:44
Message-ID: 0dde22b3-a9b9-02c0-b928-2a308ae67699 () apache ! org
[Download RAW message or body]

Severity: moderate

Description:

Improper Neutralization of Special Elements used in an OS Command ('OS =
Command Injection') vulnerability in Apache Airflow Pig Provider, Apache =
Airflow allows an attacker to control commands executed in the task =
execution context, without write access to DAG files. This issue affects =
Pig Provider versions prior to 4.0.0. It also impacts any Apache Airflow =
versions prior to 2.3.0 in case Pig Provider is installed (Pig Provider 4.0=
.0 can only be installed for Airflow 2.3.0+). Note that you need to =
manually install the Pig Provider version 4.0.0 in order to get rid of the =
vulnerability on top of Airflow 2.3.0+ version.

Credit:

Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for =
reporting the issue.

References:

https://github.com/apache/airflow/pull/27644

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic