|
|
Message-ID: <984cd814-8f9a-8525-7d5a-876bf3edb14d@apache.org> Date: Sun, 08 Mar 2026 19:09:35 +0000 From: Jarek Potiuk <potiuk@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-69219: Apache Airflow Providers Http: Unsafe Pickle Deserialization in apache-airflow-providers-http leading to RCE via HttpOperator Severity: Low Affected versions: - Apache Airflow Providers Http (apache-airflow-providers-http) 5.1.0 before 6.0.0 Description: A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk. Credit: skypher (finder) Shauryae1337 (GitHub: https://github.com/Shauryae1337) (finder) Ahmet Artuç (finder) References: https://github.com/apache/airflow/pull/61662 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-69219
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.