In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t | Mailing List Third Party Advisory | 
| https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t | Mailing List Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t - Mailing List, Third Party Advisory | 
Information
                Published : 2022-02-25 09:15
Updated : 2024-11-21 06:50
NVD link : CVE-2022-24288
Mitre link : CVE-2022-24288
CVE.ORG link : CVE-2022-24288
JSON object : View
Products Affected
                apache
- airflow
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
