Apache Airflow Command Injection in Example Dag (CVE-2020-11978)

中文版本(Chinese version)

Apache Airflow is an open source, distributed task scheduling framework. In the version prior to 1.10.10, there is a command injection vulnerability in the example DAG example_trigger_target_dag, which caused attackers to execute arbitrary commands in the worker process.

Since there are many components to be started, it may be a bit stuck. Please prepare more than 2G of memory for the use of the virtual machine.

References:

Vulnerability Environment

Execute the following commands to start airflow 1.10.10:

#Initialize the database
docker compose run airflow-init

#Start service
docker compose up -d

Exploit

Visit http://your-ip:8080 to see the airflow management terminal, and turn on the example_trigger_target_dag flag:

Click the "triger" button on the right, then input the configuration JSON with the crafted payload {"message":"'\";touch /tmp/airflow_dag_success;#"}:

Wait a few seconds to see the execution of "success":

Go to the CeleryWorker container to see the result, touch /tmp/airflow_dag_success has been successfully executed:

docker compose exec airflow-worker ls -l /tmp