7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Apache Airflow: Potential pickle deserialization vulnerability in XComs
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
References
- https://github.com/apache/airflow/pull/36255 patch
- https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn vendor-advisory
- http://www.openwall.com/lists/oss-security/2024/01/24/4
- https://github.com/apache/airflow/pull/36255 patch
- https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn vendor-advisory
- http://www.openwall.com/lists/oss-security/2024/01/24/4
- https://github.com/apache/airflow/pull/36255 x_transferred patch
- https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn vendor-advisory x_transferred
- http://www.openwall.com/lists/oss-security/2024/01/24/4 x_transferred
- https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn vendor-advisory
- http://www.openwall.com/lists/oss-security/2024/01/24/4
- https://github.com/apache/airflow/pull/36255 patch
- https://github.com/apache/airflow/pull/36255 x_transferred patch
- https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn vendor-advisory x_transferred
- http://www.openwall.com/lists/oss-security/2024/01/24/4 x_transferred
- http://www.openwall.com/lists/oss-security/2024/01/24/4
- https://github.com/apache/airflow/pull/36255 patch
- https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn vendor-advisory
- https://github.com/apache/airflow/pull/36255 x_transferred patch
- https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn vendor-advisory x_transferred
- http://www.openwall.com/lists/oss-security/2024/01/24/4 x_transferred
Affected products
- <2.8.1
Matching in nixpkgs
pkgs.apache-airflow
Programmatically author, schedule and monitor data pipelines
-
nixos-unstable -
- nixpkgs-unstable 2.7.3
Package maintainers
-
@bhipple Benjamin Hipple <bhipple@protonmail.com>
-
@ingenieroariel Ariel Nunez <ariel@nunez.co>
-
@gbpdt Graham Bennett <nix@pdtpartners.com>