apache-airflow@2.5.2rc2 vulnerabilities

Programmatically author, schedule and monitor data pipelines

Direct Vulnerabilities

Known vulnerabilities in the apache-airflow package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Certificate Validation

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Certificate Validation for FTP_TLS connections, which are created without setting the proper context using ssl.create_default_context().

How to fix Improper Certificate Validation?

Upgrade apache-airflow to version 2.9.0b1 or higher.

[,2.9.0b1)
  • M
Incorrect Default Permissions

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Incorrect Default Permissions that allow Ops and Viewers users to view all information in audit logs, including DAG names and usernames they are not permitted to view.

How to fix Incorrect Default Permissions?

Upgrade apache-airflow to version 2.8.2rc1 or higher.

[,2.8.2rc1)
  • M
Exposure of Resource to Wrong Sphere

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Exposure of Resource to Wrong Sphere due to improper permission checks in the API and UI components. An attacker can view DAG code and import errors for DAGs they are not authorized to access by exploiting this vulnerability.

How to fix Exposure of Resource to Wrong Sphere?

Upgrade apache-airflow to version 2.8.2 or higher.

[,2.8.2)
  • M
Improper Authorization

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Authorization due to improper validation of the dag_id, allowing unauthorized read access to a DAG through the URL.

How to fix Improper Authorization?

Upgrade apache-airflow to version 2.6.3 or higher.

[,2.6.3)
  • M
Deserialization of Untrusted Data

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to improper validation of input during the deserialization process of XCom data. An attacker can execute arbitrary code by submitting crafted input that bypasses the protection of the enable_xcom_pickling=False configuration setting, leading to poisoned data after deserialization.

How to fix Deserialization of Untrusted Data?

Upgrade apache-airflow to version 2.8.1 or higher.

[,2.8.1)
  • M
Missing Authorization

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Missing Authorization via the permission verification process. An attacker can read the source code of a DAG without having the proper permissions by exploiting this vulnerability.

How to fix Missing Authorization?

Upgrade apache-airflow to version 2.8.1 or higher.

[,2.8.1)
  • M
Insertion of Sensitive Information into Log File

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File via the deferrable mode with the path of a Kubernetes configuration file for authentication. An attacker can obtain the configuration file and use it to access the Kubernetes cluster by accessing the metadata or triggerer log, where the configuration dictionary is stored as plain text without masking.

How to fix Insertion of Sensitive Information into Log File?

Upgrade apache-airflow to version 2.6.1 or higher.

[2.3.0,2.6.1)
  • M
Denial of Service (DoS)

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Denial of Service (DoS) allowing an attacker to cause a service disruption by manipulating the run_id parameter.

How to fix Denial of Service (DoS)?

Upgrade apache-airflow to version 2.6.3 or higher.

[,2.6.3)
  • M
Improper Access Control

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Access Control allowing an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources that the user had no access to.

NOTE: This was thought to be fixed in version 2.7.2, with the publication of CVE-2023-42792, but it was missed.

How to fix Improper Access Control?

Upgrade apache-airflow to version 2.8.0b1 or higher.

[,2.8.0b1)
  • M
Improper Access Control

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Access Control via the varimport endpoint. A user who lacks the variable edit permission can edit a variable.

How to fix Improper Access Control?

Upgrade apache-airflow to version 2.8.0b1 or higher.

[,2.8.0b1)
  • M
Incorrect Authorization

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Incorrect Authorization in forms.py that allows authenticated users with DAG-view permission to modify some DAG run detail values (such as configuration parameters, start date, etc.) when submitting notes.

This vulnerability is the same one described by CVE-2023-40611, which has now been fixed.

How to fix Incorrect Authorization?

Upgrade apache-airflow to version 2.7.3 or higher.

[,2.7.3)
  • M
Improper Access Control

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Access Control in handling task instances. A user can read information about task instances in other DAGs.

How to fix Improper Access Control?

Upgrade apache-airflow to version 2.7.3 or higher.

[,2.7.3)
  • M
Information Exposure

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Information Exposure through the REST API for configuration. An attacker can gain access to sensitive configuration information by reading the configuration, even when the expose_config option is set to non-sensitive-only.

How to fix Information Exposure?

Upgrade apache-airflow to version 2.7.0b1 or higher.

[2.4.0,2.7.0b1)
  • M
Improper Access Control

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Access Control allowing authenticated users to list warnings for all DAGs, even if the user had no permission reveal the dag_ids and the stack-traces of import errors for those DAGs with import errors.

How to fix Improper Access Control?

Upgrade apache-airflow to version 2.7.2 or higher.

[,2.7.2)
  • M
Improper Access Control

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Access Control allowing an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources that the user had no access to.

NOTE: This was thought to be fixed in version 2.7.2, but was missed and later addressed with the publication of CVE-2023-48291.

How to fix Improper Access Control?

Upgrade apache-airflow to version 2.7.2 or higher.

[,2.7.2)
  • M
Information Exposure

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Information Exposure due to the improper access control mechanism, an authorized user with read access to specific Directed Acyclic Graphs (DAGs) can access information about task instances in other DAGs.

Note: This is only exploitable if the user has been granted read access to specific DAGs.

How to fix Information Exposure?

Upgrade apache-airflow to version 2.7.2 or higher.

[,2.7.2)
  • M
Insecure Defaults

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Insecure Defaults when it had support for the deserialize flag by default in the 'xcomEntries' API. This was an unsafe default, as deserialization may instantiate arbitrary objects.

How to fix Insecure Defaults?

Upgrade apache-airflow to version 2.7.0 or higher.

[,2.7.0)
  • M
Incorrect Authorization

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Incorrect Authorization in forms.py that allows authenticated users with DAG-view permission to modify some DAG run detail values (such as configuration parameters, start date, etc.) when submitting notes.

NOTE: This vulnerability was originally marked as fixed in 2.7.1 but the fix did not make it into that version. It was subsequently fixed in 2.7.3 and also assigned CVE-2023-47037.

How to fix Incorrect Authorization?

Upgrade apache-airflow to version 2.7.3 or higher.

[,2.7.3)
  • M
Information Exposure

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Information Exposure in a rendered template generated with views.py and timezone.py. Users who have access to see the task/dag in the UI can craft a URL, which could unmask the masked configuration of the task.

How to fix Information Exposure?

Upgrade apache-airflow to version 2.7.1 or higher.

[,2.7.1)
  • H
Denial of Service (DoS)

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Denial of Service (DoS) that can be exploited by an authenticated user with Connection edit privileges. This vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, leading to a denial of service (DoS) condition on the server.

Note:

Malicious actors can leverage this vulnerability to establish harmful connections with the server.

Mitigation:

Administrators are encouraged to review and adjust user permissions to restrict access to sensitive functionalities, reducing the attack surface.

How to fix Denial of Service (DoS)?

Upgrade apache-airflow to version 2.7.0 or higher.

[,2.7.0)
  • M
Improper Certificate Validation

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Certificate Validation. Due to the improper validation in the SSL context, an attacker could potentially intercept the client's communication in a MITM position. This vulnerability allows for the acceptance of any server's X.509 certificate leading to possible disclosure of mail server credentials or mail content.

Note:

This is only exploitable if the default SSL context is being used. The attacker will need to inject themselves within the logical network path between the target and the resource requested by the victim in order to read and/or modify network communications.

How to fix Improper Certificate Validation?

Upgrade apache-airflow to version 2.7.0 or higher.

[,2.7.0)
  • H
Session Fixation

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Session Fixation. An authenticated user can continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user.

Note: Other than manually cleaning the session database (for database session backend), or changing the secure_key and restarting the webserver, there are no mechanisms to force-logout the user.

How to fix Session Fixation?

Upgrade apache-airflow to version 2.7.0 or higher.

[,2.7.0)
  • H
Execution with Unnecessary Privileges

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Execution with Unnecessary Privileges via the "Run Task" feature, which allows users to execute code in the webserver context and access certain DAGs.

How to fix Execution with Unnecessary Privileges?

Upgrade apache-airflow to version 2.6.0b1 or higher.

[,2.6.0b1)
  • M
Improper Input Validation

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Input Validation which allows an authenticated user to use crafted input to make the current request hang.

How to fix Improper Input Validation?

Upgrade apache-airflow to version 2.6.3 or higher.

[,2.6.3)
  • M
Incorrect Authorization

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Incorrect Authorization due to improper validation of the dag_id parameter, which allows unauthorized read access to a DAG through the URL.

How to fix Incorrect Authorization?

Upgrade apache-airflow to version 2.6.3 or higher.

[,2.6.3)
  • M
Directory Traversal

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Directory Traversal by manipulating the run_id parameter due to improper input sanitization, which allows an attacker to perform unauthorized file access outside the intended directory structure.

How to fix Directory Traversal?

Upgrade apache-airflow to version 2.6.3 or higher.

[,2.6.3)
  • M
Information Exposure

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Information Exposure via the Connection edit view, which allows an unauthorized actor to gain access to sensitive information

Note: Exploiting this vulnerability requires someone with access to Connection resources, specifically updating the connection to exploit it.

How to fix Information Exposure?

Upgrade apache-airflow to version 2.6.3 or higher.

[,2.6.3)
  • L
Information Exposure

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Information Exposure when potentially sensitive values are shown to the user in certain situations.

NOTE: By default, [webserver] expose_config is set to False. This vulnerability is only exploitable if it is set to non-sensitive-only instead.

How to fix Information Exposure?

Upgrade apache-airflow to version 2.6.2 or higher.

[2.5.0,2.6.2)
  • M
Privilege Escalation

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Privilege Escalation due to missing permissions validation in the File Task Handler. An attacker can use airflow logs to trigger this vulnerability.

Note: Default permissions are set to group-writeable allowing for impersonation use case.

How to fix Privilege Escalation?

Upgrade apache-airflow to version 2.6.0 or higher.

[,2.6.0)
  • M
Cross-site Scripting (XSS)

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization via the task instance details page in the UI.

How to fix Cross-site Scripting (XSS)?

Upgrade apache-airflow to version 2.6.0 or higher.

[,2.6.0)
  • M
Information Exposure

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Information Exposure such that the UI traceback contains information that might be useful for a potential attacker to better target their attack.

How to fix Information Exposure?

Upgrade apache-airflow to version 2.5.2 or higher.

[,2.5.2)