7.5
CVSSv2

CVE-2020-11981

Published: 17/07/2020 Updated: 24/07/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache airflow

Github Repositories

FEP3370-HT22-50570-Advanced-Ethical-Hacking In this work, we are going to see two different vulnerability exploitation in the vulnerable versions of Apache Airflow Apache Airflow is an open-source workflow management platform that performs distributed task scheduling, ie, it considered as a platform to programmatically author, schedule, and monitor workflows This project wa