CVE-2024-29733
low-risk
Published 2024-04-21
Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly. This issue affects Apache Airflow FTP Provider: before 3.7.0. Users are recommended to upgrade to version 3.7.0, which fixes the issue.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.7/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Apache-Airflow-Providers-Ftp
Affected Vendors
References (10)
Technical Description
https://docs.python.org/3/library/ssl.html#best-defaults
Issue Tracking
https://github.com/apache/airflow/pull/38266
Technical Description
https://docs.python.org/3/library/ssl.html#best-defaults
Issue Tracking
https://github.com/apache/airflow/pull/38266
19
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal