CVE-2022-38170: Apache Airflow exposes arbitrary file content
(updated )
In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the --daemon
flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver.
References
- github.com/advisories/GHSA-q8h9-pqcx-59hw
- github.com/apache/airflow
- github.com/apache/airflow/commit/b6a2cd1aa34f69a36ea127e4f7f5ba87f4aca420
- github.com/apache/airflow/commit/bf01d10cd348e679916034de1befb79ec6e46ff8
- github.com/apache/airflow/commit/c14ea8f0f34944d2ecfa9021d167602e8b2b8b90
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2022-261.yaml
- lists.apache.org/thread/zn8mbbb1j2od5nc9zhrvb7rpsrg1vvzv
- nvd.nist.gov/vuln/detail/CVE-2022-38170
Detect and mitigate CVE-2022-38170 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →