CVE-2024-45498:
Apache Airflow vulnerable to Improper Encoding or Escaping of Output
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.78002%
CWE
Published
9/7/2024
Updated
11/25/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-airflow | pip | = 2.10.0 | 2.10.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the unescaped Jinja template variable in the BashOperator's bash_command parameter. The patch adds the |tojson filter to properly escape the output, confirming the lack of output encoding was the root cause. The example DAG's code explicitly demonstrates this insecure pattern, making the BashOperator instance in example_inlet_event_extra.py the vulnerable component.