Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Airflow | 1.10.10 and below | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC of how to exploit a RCE vulnerability of the example DAGs in Apache Airflow <1.10.11 | https://github.com/pberba/CVE-2020-11978 | POC Details |
| 2 | Apache Airflow versions 1.10.10 and below are vulnerable to remote code/command injection vulnerabilities in one of the example DAGs shipped with Airflow. This could allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-11978.yaml | POC Details |
| 3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Apache%20Airflow%20%E7%A4%BA%E4%BE%8BDAG%E4%B8%AD%E7%9A%84%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%20CVE-2020-11978.md | POC Details |
| 4 | https://github.com/vulhub/vulhub/blob/master/airflow/CVE-2020-11978/README.md | POC Details | |
| 5 | None | https://github.com/stuxbench/mlflow-cve-2020-11978 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-9485 | Apache Airflow 跨站脚本漏洞 | |
| CVE-2020-11983 | Apache Airflow 跨站脚本漏洞 | |
| CVE-2020-11982 | Apache Airflow 代码问题漏洞 | |
| CVE-2020-11981 | Apache Airflow 操作系统命令注入漏洞 |
No comments yet