Vulnerability Details : CVE-2022-40604
In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction.
Vulnerability category: Overflow
Products affected by CVE-2022-40604
- cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-40604
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-40604
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-40604
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by:
- nvd@nist.gov (Primary)
- security@apache.org (Secondary)
References for CVE-2022-40604
-
https://lists.apache.org/thread/z20x8m16fnhxdkoollv53w1ybsts687t
CVE-2022-40604: Apache Airflow: Format String Vulnerability-Apache Mail ArchivesVendor Advisory
-
https://github.com/apache/airflow/pull/26337
Properly build URL to retrieve logs independently from system by potiuk · Pull Request #26337 · apache/airflow · GitHubPatch;Third Party Advisory
Jump to