CVE-2022-40604: Apache Airflow vulnerable to Use of Externally-Controlled Format String
(updated )
In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction.
References
- github.com/advisories/GHSA-5rp4-749p-vx26
- github.com/apache/airflow
- github.com/apache/airflow/commit/18386026c28939fa6d91d198c5489c295a05dcd2
- github.com/apache/airflow/commit/6f24836e5ee56c452947aa87f84a21dd4f8eb87c
- github.com/apache/airflow/pull/26337
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2022-279.yaml
- lists.apache.org/thread/z20x8m16fnhxdkoollv53w1ybsts687t
- nvd.nist.gov/vuln/detail/CVE-2022-40604
Detect and mitigate CVE-2022-40604 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →