.. / CVE-2022-40127

Exploit for AirFlow < 2.4.0 - Remote Code Execution (CVE-2022-40127)

Description:

A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.

Nuclei Template

View the template here CVE-2022-40127.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-40127.yaml
Copy

References:

https://lists.apache.org/thread/cf132hgm6jvzvsbpsozl3plf1r4cwysy
https://github.com/Mr-xn/CVE-2022-40127
https://nvd.nist.gov/vuln/detail/CVE-2022-40127
http://www.openwall.com/lists/oss-security/2022/11/14/2
https://github.com/apache/airflow/pull/25960