In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.
No PoCs from references.
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Hax0rG1rl/my_cve_and_bounty_poc
- https://github.com/happyhacking-k/happyhacking-k
- https://github.com/happyhacking-k/my_cve_and_bounty_poc