{"id":"CVE-2020-11978","details":"An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.","aliases":["BIT-airflow-2020-11978","GHSA-rvmq-4x66-q7j3","PYSEC-2020-14"],"modified":"2026-04-02T02:10:11.857142Z","published":"2020-07-17T00:15:10.337Z","references":[{"type":"ADVISORY","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11978"},{"type":"ADVISORY","url":"https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/airflow","events":[{"introduced":"0"},{"fixed":"f53b1d0041d3dc087ff2c6addaa72266e784b928"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.10.11"}]}}],"versions":["constraints-1.10.1","constraints-1.10.10","constraints-1.10.2","constraints-1.10.3","constraints-1.10.4","constraints-1.10.5","constraints-1.10.6","constraints-1.10.7","constraints-1.10.8","constraints-1.10.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11978.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}