cve/2024/CVE-2024-45498.md

18 lines
1.1 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-45498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45498)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Airflow&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.10.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output&color=brighgreen)
### Description
Example DAG: example_inlet_event_extra.py shipped with Apache Airflow version 2.10.0 has a vulnerability that allows an authenticated attacker with only DAG trigger permission to execute arbitrary commands. If you used that example as the base of your DAGs - please review if you have not copied the dangerous example; see https://github.com/apache/airflow/pull/41873  for more information. We recommend against exposing the example DAGs in your deployment. If you must expose the example DAGs, upgrade Airflow to version 2.10.1 or later.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nhienit2010/nhienit2010