Untriaged
Apache Airflow: Potential pickle deserialization vulnerability in XComs
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
Affected products
apache-airflow
- <2.8.1
Matching in nixpkgs
pkgs.apache-airflow
Programmatically author, schedule and monitor data pipelines
-
nixos-unstable -
- nixpkgs-unstable 2.7.3
Package maintainers
-
@bhipple Benjamin Hipple <bhipple@protonmail.com>
-
@ingenieroariel Ariel Nunez <ariel@nunez.co>
-
@gbpdt Graham Bennett <nix@pdtpartners.com>