[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2022-40189: Apache Airlfow Pig Provider RCE
From: Jarek Potiuk <potiuk () apache ! org>
Date: 2022-11-21 20:33:44
Message-ID: 0dde22b3-a9b9-02c0-b928-2a308ae67699 () apache ! org
[Download RAW message or body]
Severity: moderate
Description:
Improper Neutralization of Special Elements used in an OS Command ('OS =
Command Injection') vulnerability in Apache Airflow Pig Provider, Apache =
Airflow allows an attacker to control commands executed in the task =
execution context, without write access to DAG files. This issue affects =
Pig Provider versions prior to 4.0.0. It also impacts any Apache Airflow =
versions prior to 2.3.0 in case Pig Provider is installed (Pig Provider 4.0=
.0 can only be installed for Airflow 2.3.0+). Note that you need to =
manually install the Pig Provider version 4.0.0 in order to get rid of the =
vulnerability on top of Airflow 2.3.0+ version.
Credit:
Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for =
reporting the issue.
References:
https://github.com/apache/airflow/pull/27644
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic