Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. apache-airflow
  4. ›
  5. CVE-2020-11978

CVE-2020-11978: Remote code execution (RCE) in Apache Airflow

July 27, 2020 (updated September 11, 2024)

An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.

References

  • github.com/advisories/GHSA-rvmq-4x66-q7j3
  • github.com/apache/airflow
  • github.com/apache/airflow/commit/2fa51576e1283f5732e38fada686fd248d9c3a1e
  • github.com/apache/airflow/commit/4d8599e8b0520ff4226fbad72f724afae50fdd08
  • github.com/apache/airflow/pull/9143
  • github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2020-14.yaml
  • lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E
  • nvd.nist.gov/vuln/detail/CVE-2020-11978

Code Behaviors & Features

Detect and mitigate CVE-2020-11978 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.10.11rc1

Fixed versions

  • 1.10.11rc1

Solution

Upgrade to version 1.10.11rc1 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

pypi/apache-airflow/CVE-2020-11978.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:58 +0000.