CVE-2020-11978:
Remote code execution (RCE) in Apache Airflow
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99926%
CWE
Published
7/27/2020
Updated
9/11/2024
KEV Status
Yes
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-airflow | pip | >= 0, < 1.10.11rc1 | 1.10.11rc1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure usage of BashOperator in the example_trigger_target_dag.py. The original implementation constructed bash_command by directly embedding dag_run.conf['message'] (user-controlled input) into the command string via Jinja templating. This allowed attackers to escape the command context and execute arbitrary commands. The patch moved user input to the 'env' parameter and used environment variable substitution, demonstrating the vulnerable pattern was in the BashOperator's bash_command parameter handling within this specific example DAG.