[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2023-50943: Apache Airflow: Potential pickle deserialization vulnerability in XCo
From: Ephraim Anierobi <ephraimanierobi () apache ! org>
Date: 2024-01-24 11:06:36
Message-ID: c3e431d2-61c6-ec2a-89e2-830e0eb9c84c () apache ! org
[Download RAW message or body]
Severity: low
Affected versions:
- Apache Airflow before 2.8.1
Description:
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to \
poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration \
setting resulting in poisoned data after XCom deserialization. This vulnerability is considered \
low since it requires a DAG author to exploit it. Users are recommended to upgrade to version \
2.8.1 or later, which fixes this issue.
Credit:
Peng Zhou (zpbrent@gmail.com) (finder)
Hussein Awala (remediation developer)
References:
https://github.com/apache/airflow/pull/36255
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-50943
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic