Apache Airflow < 1.10.10 - OS Command Injection
Title source: ruleDescription
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
Exploits (1)
Nuclei Templates (1)
Apache Airflow <=1.10.10 - Command Injection
CRITICALVERIFIEDby pussycat0x
Shodan:
product:"redis" || http.title:"airflow - dags" || http.html:"apache airflow" || http.title:"sign in - airflow"
FOFA:
apache airflow || title="airflow - dags" || http.html:"apache airflow" || title="sign in - airflow"
Scores
CVSS v3
9.8
EPSS
0.9159
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
CWE
CWE-78
Status
published
Products (2)
apache/airflow
< 1.10.10
pypi/apache-airflow
0 - 1.10.11rc1PyPI
Published
Jul 17, 2020
Tracked Since
Feb 18, 2026