CVE-2022-38170

In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/09/02/12 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/02/3 Mailing List Mitigation Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/21/2 Mailing List Third Party Advisory
https://lists.apache.org/thread/zn8mbbb1j2od5nc9zhrvb7rpsrg1vvzv Mailing List Mitigation Vendor Advisory
http://www.openwall.com/lists/oss-security/2022/09/02/12 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/02/3 Mailing List Mitigation Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/21/2 Mailing List Third Party Advisory
https://lists.apache.org/thread/zn8mbbb1j2od5nc9zhrvb7rpsrg1vvzv Mailing List Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:15

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/09/02/12 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/02/12 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/09/02/3 - Mailing List, Mitigation, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/02/3 - Mailing List, Mitigation, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/09/21/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/21/2 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/zn8mbbb1j2od5nc9zhrvb7rpsrg1vvzv - Mailing List, Mitigation, Vendor Advisory () https://lists.apache.org/thread/zn8mbbb1j2od5nc9zhrvb7rpsrg1vvzv - Mailing List, Mitigation, Vendor Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-362 CWE-732

Information

Published : 2022-09-02 07:15

Updated : 2024-11-21 07:15


NVD link : CVE-2022-38170

Mitre link : CVE-2022-38170

CVE.ORG link : CVE-2022-38170


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource