Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-40127Code Injection in Software Foundation Apache Airflow

Severity
8.8HIGHNVD
EPSS
93.3%
top 0.19%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 14
Latest updateJan 5

Description

A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDapache/airflow< 2.4.0
CVEListV5apache_software_foundation/apache_airflowApache Airflow2.4.0

Patches

🔴Vulnerability Details

4
OSV
Apache Airflow vulnerable to OS Command Injection via example DAGs2022-11-14
CVEList
Apache Airflow <2.4.0 has an RCE in a bash example2022-11-14
OSV
CVE-2022-40127: A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually p2022-11-14
GHSA
Apache Airflow vulnerable to OS Command Injection via example DAGs2022-11-14

💥Exploits & PoCs

1
Nuclei
AirFlow < 2.4.0 - Remote Code Execution

💬Community

1
HackerOne
CVE-2022-40127: RCE in Apache Airflow <2.4.0 bash example2023-01-05
CVE-2022-40127 — Code Injection | cvebase