[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2023-50943: Apache Airflow: Potential pickle deserialization vulnerability in XCo
From:       Ephraim Anierobi <ephraimanierobi () apache ! org>
Date:       2024-01-24 11:06:36
Message-ID: c3e431d2-61c6-ec2a-89e2-830e0eb9c84c () apache ! org
[Download RAW message or body]

Severity: low

Affected versions:

- Apache Airflow before 2.8.1

Description:

Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to \
poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration \
setting resulting in poisoned data after XCom deserialization. This vulnerability is considered \
low since it requires a DAG author to exploit it. Users are recommended to upgrade to version \
2.8.1 or later, which fixes this issue.

Credit:

Peng Zhou (zpbrent@gmail.com) (finder)
Hussein Awala (remediation developer)

References:

https://github.com/apache/airflow/pull/36255
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-50943


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic