apache-airflow@2.9.1rc2 vulnerabilities

Programmatically author, schedule and monitor data pipelines

Direct Vulnerabilities

Known vulnerabilities in the apache-airflow package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Insertion of Sensitive Information into Log File

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File in the form of configuration variables belonging to other DAG author users. If these variables contain sensitive values, which is a fact out of the attacking user's control, they will be exposed.

How to fix Insertion of Sensitive Information into Log File?

Upgrade apache-airflow to version 2.10.3rc1 or higher.

[,2.10.3rc1)
  • M
Uninitialized Memory Exposure

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Uninitialized Memory Exposure which allows authenticated users with audit log access to see sensitive unencrypted stored values set via the airflow CLI.

Note: Users who are using the CLI to set secret variables are advised to manually delete entries with those variables from the log table.

How to fix Uninitialized Memory Exposure?

Upgrade apache-airflow to version 2.10.3 or higher.

[,2.10.3)
  • H
Execution with Unnecessary Privileges

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Execution with Unnecessary Privileges due to the ability of DAG authors to add local settings to the DAG folder which then gets executed by the scheduler. An attacker can escalate privileges and execute arbitrary code by manipulating the DAG configuration files. This vulnerability is can be exploited by an attacker with DAG author permissions.

How to fix Execution with Unnecessary Privileges?

Upgrade apache-airflow to version 2.10.1 or higher.

[,2.10.1)
  • H
Improper Encoding or Escaping of Output

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Encoding or Escaping of Output through the example_inlet_event_extra.py DAG configuration. An attacker with DAG trigger permissions can execute arbitrary commands by exploiting this vulnerability.

How to fix Improper Encoding or Escaping of Output?

Upgrade apache-airflow to version 2.10.1 or higher.

[,2.10.1)
  • M
Cross-site Scripting (XSS)

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the provider documentation link due to improper user input sanitization in the get_doc_url_for_provider function. By enticing a user to click on a maliciously crafted provider link, an attacker can execute scripts in the context of the user's browser session.

How to fix Cross-site Scripting (XSS)?

Upgrade apache-airflow to version 2.10.0 or higher.

[,2.10.0)
  • M
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') that allows an authenticated attacker to inject a malicious link into the provider installation process.

How to fix Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')?

Upgrade apache-airflow to version 2.9.3 or higher.

[,2.9.3)
  • H
Improper Control of Generation of Code ('Code Injection')

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') which allows an authenticated DAG attacker to craft a doc_md parameter and execute arbitrary code in the scheduler context

How to fix Improper Control of Generation of Code ('Code Injection')?

Upgrade apache-airflow to version 2.9.3 or higher.

[2.4.0,2.9.3)
  • M
Use of Web Browser Cache Containing Sensitive Information

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Use of Web Browser Cache Containing Sensitive Information by not returning the Cache-Control header for dynamic content. This allows sensitive data to be written to the local browser cache.

How to fix Use of Web Browser Cache Containing Sensitive Information?

Upgrade apache-airflow to version 2.9.2 or higher.

[,2.9.2)
  • M
Cross-site Scripting (XSS)

apache-airflow is a platform to programmatically author, schedule, and monitor workflows.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the task instance logs. An authenticated attacker can inject malicious data by exploiting this vulnerability.

How to fix Cross-site Scripting (XSS)?

Upgrade apache-airflow to version 2.9.1 or higher.

[2.9.0,2.9.1)