Safety vulnerability ID: 70645
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly.
Latest version: 3.11.1
Provider package apache-airflow-providers-ftp for Apache Airflow
Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly. This issue affects Apache Airflow FTP Provider: before 3.7.0. Users are recommended to upgrade to version 3.7.0, which fixes the issue. See CVE-2024-29733.
MISC:https://docs.python.org/3/library/ssl.html#best-defaults: https://docs.python.org/3/library/ssl.html#best-defaults
MISC:https://github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280: https://github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280
MISC:https://github.com/apache/airflow/pull/38266: https://github.com/apache/airflow/pull/38266
MISC:https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2: https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application