Safety vulnerability ID: 64194
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Arbitrary code execution in Apache Airflow CNCF Kubernetes provider allows user to change xcom sidecar image and resources via Airflow connection. In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner.
Latest version: 10.0.1
Provider package apache-airflow-providers-cncf-kubernetes for Apache Airflow
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application