.. / CVE-2020-11978

Exploit for Apache Airflow <=1.10.10 - Remote Code Execution (CVE-2020-11978)

Description:

Apache Airflow versions 1.10.10 and below are vulnerable to remote code/command injection vulnerabilities in one of the example DAGs shipped with Airflow. This could allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use).

Nuclei Template

View the template here CVE-2020-11978.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-11978.yaml
Copy

References:

https://github.com/pberba/CVE-2020-11978
https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E
https://twitter.com/wugeej/status/1400336603604668418
http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11978