Skip to content

Improper Certificate Validation vulnerability in Apache Airflow FTP Provider

Low severity GitHub Reviewed Published Apr 21, 2024 to the GitHub Advisory Database • Updated Jul 3, 2024

Package

pip apache-airflow-providers-ftp (pip)

Affected versions

< 3.7.0

Patched versions

3.7.0

Description

Improper Certificate Validation vulnerability in Apache Airflow FTP Provider.

The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly.

This issue affects Apache Airflow FTP Provider: before 3.7.0.

Users are recommended to upgrade to version 3.7.0, which fixes the issue.

References

Published by the National Vulnerability Database Apr 21, 2024
Published to the GitHub Advisory Database Apr 21, 2024
Reviewed Apr 24, 2024
Last updated Jul 3, 2024

Severity

Low
2.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2024-29733

GHSA ID

GHSA-3gg8-mc87-cq3h

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.